4 tools to protect and manage multiple passwords

When the popular Web site Gawker was hacked into recently, more than a million user IDs and passwords were released. If you were one of the people compromised that's annoying -- very annoying.

Share on LinkedIn Comment on this article Share with Google+ Published on: January 6th, 2011 Steven Vaughan-Nichols

Trend Micro fortifies mobile security with acquisition

Trend Micro announced that it has signed a definitive agreement to acquire Mobile Armor--a company that specializes in endpoint data protection. The move strengthens Trend Micro's data protection capabilities and positions it to

Share on LinkedIn Comment on this article Share with Google+ Published on: November 30th, 2010 Tony Bradley

Most BlackBerry owners not concerned about government negotiations

After a series of governments threatened BlackBerry bans, Research in Motion (RIM) negotiated to avoid service cut-offs. Canadians are split on whether the devices are actually now less secure or not. In a poll

Share on LinkedIn Comment on this article Share with Google+ Published on: November 10th, 2010 Brian Jackson

How to secure iPads for business use

When Apple's iOS 4.2 debuts next month, it will offer enough features to make the iPad tablet a device that's safe for business if IT security teams take the right steps. Top among

Share on LinkedIn Comment on this article Share with Google+ Published on: October 25th, 2010 Tim Greene

BitDefender 2011 offers balanced security protection for home offices

BitDefender is trying to strike a balance between security protection and speed with its small home office software, and selling it at an affordable price starting Aug. 17.The Bucharest, Romania-based security vendor doesn’t

Share on LinkedIn Comment on this article Share with Google+ Published on: August 13th, 2010 Brian Jackson

Windows 7 security features you didn’t know about

The words Windows and security have not always been compatible. In the past, Microsoft's quest to make its operating system as easy to manage as possible for the "typical" user has often meant

Share on LinkedIn Comment on this article Share with Google+ Published on: August 5th, 2010 Logan Kugler

‘Timing attack’ could affect millions of Web users

A well-known cryptographic attack could be used by hackers to log into Web applications used by millions of users, according to two security experts who plan to discuss the issue at an upcoming

Share on LinkedIn Comment on this article Share with Google+ Published on: July 19th, 2010 Robert McMillan

E-mail mgt service offers law firm peace of mind

Have you just sent a confidential e-mail to the wrong person? Do you want it back, but can't be sure if the receiver copied or printed it?Conventional e-mail has become indispensible for many

Share on LinkedIn Comment on this article Share with Google+ Published on: June 25th, 2010 Nestor Arellano

iPad’s lack of security shouldn’t stop business adoption

There they go again, those Neanderthal IT folks who use security as a reason to resist change. A recent Computerworld story cites unnamed analysts as giving Apple's iPad an "F" for its security

Share on LinkedIn Comment on this article Share with Google+ Published on: April 21st, 2010 Galen Gruman

Public hotspots pose security pitfalls

Picture this: You're at a café with your laptop and latte in hand, getting ready to review new sales leads and the quarterly financial projections. First you hop on the free Wi-Fi that

Share on LinkedIn Comment on this article Share with Google+ Published on: April 20th, 2010

3 encryption apps to secure your data

Laptop computers have become mobile stores of massive amounts of information. Add to that the proliferation of removable hard drives, and it becomes crystal clear how much sensitive data is on the move

Share on LinkedIn Comment on this article Share with Google+ Published on: March 2nd, 2010 Frank J. Ohlhorst

Canada’s privacy watchdogs turn spotlight on technology

Privacy commissioners at the federal and provincial level are both honing their approach to the challenges of protecting personal information rights in a digital age. Technology is often seen as either a way

Share on LinkedIn Comment on this article Share with Google+ Published on: January 21st, 2010 Brian Jackson

1.5 million insurance customers’ personal data lost in breach

A hard drive with seven years' worth of personal financial and medical information on about 1.5 million customers of Health Net of the Northeast Inc. was reported missing to state officials yesterday --

Share on LinkedIn Comment on this article Share with Google+ Published on: November 23rd, 2009 Lucas Mearian

Apple blunder – iPhone update renders device useless with Exchange

Fixing a major but unacknowledged bug in the operating system, last week's iPhone OS 3.1 update has rendered most iPhones and all iPod Touches incompatible with Exchange 2007 servers that require on-device data

Share on LinkedIn Comment on this article Share with Google+ Published on: September 16th, 2009 Galen Gruman