The precision of security undermined by a failure to correlate

If Paul Newman’s Cool Hand Luke character were to address the security industry, his opening line would likely be: “What we have here is a failure to correlate.” Today, one of the major deficiencies affecting security is not a lack of data or even an aggregation of data, but the central problem is one of correlating data and connecting the dots to…

Windows 10: What CIOs think of it so far

Tech chiefs think Windows 10 is a step in the right direction, but does it offer any reasons for firms to migrate from Windows 7? Windows 10, Microsoft’s next operating system, isn’t expected until the middle of next year at least, and the company is still slowly revealing the details, which include support for a wider range of devices and…

5 Features on iOS7 that Apple users should know

iOS 7 was a break from the traditional form of iOS and brought a revolutionary design, but there are other features that Apple didn’t announce. Here are five useful but hidden iOS 7 features. Apple’s iOS 7 is so packed full of features that you may not discover them all at first glance. In this article, I’ll highlight five things…

Microsoft finally gets it right with the Surface 3

Microsoft unveiled the new Surface 3 tablet yesterday rather than the Surface Pro 4 everyone was expecting. The new Surface 3 dumps the ARM processor and Windows RT to deliver an economical Surface tablet that still has the power and capabilities users need. It looks like Microsoft has finally hit the nail on the head. The Surface 3 will be…

How to Identify Spam & Phishing Emails

10 Ways to Identify Spam & Phishing Emails   1. The message contains a mismatched URL One of the first things that I recommend checking in a suspicious email message is the integrity of any embedded URLs. Often times the URL in a phishing message will appear to be perfectly valid. However, if you hover your mouse over top of…

multiuserhero

Android L will bring multi-user support to smartphones

I’ve been watching the progress of the various incarnations of Android. Some of the developments (such as the Guest Access mode on the LG G3) point toward a certain feature arriving in Android L (the hotly anticipated next iteration of Android). But this is no longer a rumor or a “what if,” because an unnamed developer with Google said “the…

androidistock

10 Things you can do to make your Android device more secure

This list of security do’s and don’ts will help you safeguard your Android device and protect that valuable data. Image: iStockphoto.com/martin-dm Android is not only one of the most flexible platforms on the market, it is also one of the most widespread. The fact that so many people are using Android suggests that more people will be targeting those devices…

no iOS Zone

Security firm shows how to crash an iPhone with a wireless DoS attack

It’s highly unlikely that people have experienced this on their iPhone or iPad, but it’s possible that iOS app crashes could be due to a wireless denial of service (DoS) attack. That’s because SkyCure, a mobile device security company, has actually replicated the attack and explained it as high level during the 2015 RSA Conference. Even worse, the attack can…

Apple failed to fix “rootpipe” backdoor flaw, researcher warns

A bug that Apple said it fixed in the latest release of its OS X desktop operating system continues to plague every Mac owner, after a researcher found a way to exploit the flaw again. Dubbed “rootpipe,” researchers claimed the vulnerability allows hackers or malicious actors to escalate a user’s privileges, making it easier to spread system-wide malware or take…

handgrabbing

10 VoIP features that can benefit your small business

1: Door phone entry buzzer integration This feature allows you to integrate an analog door phone so that you can have a two-way call with visitors and then unlock the door from your phone if you deem them worthy. A great way to upgrade the security of your building. 2: Find me/follow me call routing Mobile workers will appreciate this…