Please turn on your JavaScript for this page to function normally.
LastPass
LastPass 4.0 features fresh UX, emergency access, sharing center

The latest version of the popular password manager includes a new UX, and a host of new features. LastPass 4.0 is immediately available on all browsers and platforms, …

Businessman juggling
Tips for implementing a converged infrastructure

CIOs will find themselves at an interesting crossroads this year as their organizations struggle to become Digital-Enabled Enterprises, businesses that embrace technology and …

Samsung Portable SSD T3
Samsung Portable SSD T3 offers increased data security and portability

Samsung announced the Samsung Portable SSD T3, a palm-sized, external SSD that offers multi-terabyte storage capacity. Designed specifically for today’s mobile lifestyle, the …

Heartbeat
When hacking saves lives: Hacking medical devices and implants

Of all the IoT devices out there, none are more crucial to users than the medical devices that help them simplify the management of certain medical conditions or, in the most …

Wi-Fi Alliance
Wi-Fi HaLow to extend Wi-Fi solutions for the Internet of Things

With industry momentum mounting around a low power Wi-Fi solution, Wi-Fi Alliance announced the Wi-Fi HaLow designation for products incorporating IEEE 802.11ah technology. …

Android
January Android security update fixes 5 critical flaws, removes unneeded component

Google has released the January security update for Android (for its Nexus devices). The update fixes 12 issues, five of which are critical. The most important hole …

Keyboard
Confusion about IT security leaves devices at risk

When it comes to Internet security, consumer concern and awareness are both on the increase. However, despite a growing recognition of the need to protect devices, many …

IoT connection
An Internet of Things wish list for 2016

I’ve been writing about the Internet of Things for a while now, both from the perspective of the great opportunities that the IoT offers and the very real pressure it will put …

code
De-anonymizing code authors by analyzing executable binaries

A group of researchers that have previously proven that it’s possible to de-anonymize programmers by analysing the source code of programs they have created, have now …

Netgear logo
Netgear Nighthawk X4S AC2600 Smart WiFi Router released

Netgear is launching the new Nighthawk X4S AC2600 Smart WiFi Router (R7800) for people who value speed. The Nighthawk X4S supports Wave 2 WiFi features like quad-stream …

Glass
BlackEnergy APT is back, deleting files and killing computer systems

The BlackEnergy APT – or SandWorm group, as some researchers call it – has been active since 2007 (at least). Its past exploits include cyber-espionage campaigns …

Cisco Jabber
Cisco Jabber flaw allows MitM attackers to wiretap communications

A vulnerability in Cisco’s Jabber client for Windows can be exploited by attackers to wiretap communications, steal user credentials, and to tamper with messages sent …

Don't miss

Cybersecurity news