Chip maker goes to court to prevent smart cards flaws being made public

A semiconductor company is suing a Dutch university to keep its researchers from publishing information about security flaws in the RFID chips used in up to 2 billion smart cards. p>The cards are

Share on LinkedIn Comment on this article Share with Google+ Published on: July 14th, 2008 Sharon Gaudin

Should Apple iTunes be allowed on company computers?

Apple's iTunes is by far one of the most popular and widely-used consumer IT applications available today. It's likely more of your users have an iPod and employ iTunes than staffers that don't,

Share on LinkedIn Comment on this article Share with Google+ Published on: July 14th, 2008 Al Sacco and Ben Worthen

Build a video surveillance system for as little as $250

Want to keep track of things at home or in the office when you're not there? Rather than spending thousands of dollars to have a professional video security system installed, you can build

Share on LinkedIn Comment on this article Share with Google+ Published on: July 7th, 2008 Brian Nadel

Cloud-computing and the seven deadly data risks

Cloud computing is fraught with security risks, according to analyst firm Gartner. Smart customers will ask tough questions, and consider getting a security assessment from a neutral third party before committing to a

Share on LinkedIn Comment on this article Share with Google+ Published on: July 7th, 2008 Jon Brodkin

Trolls trash MySpace group profiles, wreak havoc

One of the first social networking upstarts, MySpace, is facing continuing security problems that threaten to spoil many of the innovative features that make the site useful.Hackers, spammers and Internet malcontents have turned

Share on LinkedIn Comment on this article Share with Google+ Published on: July 3rd, 2008 Jeremy Kirk

Notebooks as a service – a small biz offering with “big” potential

While software – or even hardware – as a service isn't a novel concept, a market may be emerging for what some call "notebooks as a service." One player in this space is

Share on LinkedIn Comment on this article Share with Google+ Published on: June 27th, 2008 Vawn Himmelsbach

Chinese, US sites biggest hosts of malicious code

More than half the sites spreading malicious code are hosted on Chinese networks, an anti-malware group said Wednesday.p>Of the over 213,000 malware-hosting sites analyzed last month by Stopbadware.org -- a joint effort of

Share on LinkedIn Comment on this article Share with Google+ Published on: June 26th, 2008 Gregg Keizer

One in three IT admins pry into out-of-bounds information

One in three IT administrators say that they or one of their colleagues have used top-level admin passwords to pry into confidential or sensitive information at their workplaces, according to a survey by

Share on LinkedIn Comment on this article Share with Google+ Published on: June 24th, 2008 Gregg Keizer

How to safely use Facebook and LinkedIn at work

The virtual flood gates have been opened and social networking is rushing in from the personal lives of employees and into the workplace – bringing a host of concerns along with it.Facebook is

Share on LinkedIn Comment on this article Share with Google+ Published on: June 23rd, 2008 Brian Jackson

There’s a cyber war looming and we’re doing little about it

"Rogue" states and criminal organizations have stepped up their capabilities to launch crippling online attacks, says technology strategist who has briefed U.S. members of Congress on threats of a "cyber war".That's the bad

Share on LinkedIn Comment on this article Share with Google+ Published on: June 18th, 2008 Nestor Arellano

PCI compliance need not be scary for SMBs

Compliance is one of those words that send chills down the spine, inspiring nightmares that involve blood-thirsty lawyers, courtrooms and large amounts of money. Handling customer credit card data is a serious responsibility

Share on LinkedIn Comment on this article Share with Google+ Published on: June 17th, 2008 Jeremy Disse

Call to end laptop seizures could benefit Canadian travelers

Canadian business travelers to the U.S. might not have to deal for with hassle of have their laptops searched by American border guards if a lobby by a digital rights group and an

Share on LinkedIn Comment on this article Share with Google+ Published on: June 16th, 2008 Grant Gross

Call to end routine laptop searches may benefit Canadian travelers

Canadian business travelers to the U.S. might not have the hassle of having their laptops searched by American border guards if lobbying by a digital rights group and an association of corporate travelers

Share on LinkedIn Comment on this article Share with Google+ Published on: June 16th, 2008 Grant Gross

Eight easy ways to protect your company data – and reputation

With privacy laws getting more stringent, Canadian businesses need to take a hard look at their compliance policies or face dire consequences, experts say.Penalties for not playing by the book are stiff, warns

Share on LinkedIn Comment on this article Share with Google+ Published on: June 16th, 2008 Brian Jackson