2 days ago Judge throws antivirus patents back to HellThe Register View Synopsis+1
Loss of two patents cripples case with Trend Micro, could slash Symantec payout
A US district court has torn the heart out of two patents wielded by Intellectual Ventures against two antivirus makers.
Cybersecurity legislation remains in a mess, with a mad dash to get it through risking serious problems.
Jesus Vigo goes over three ways to recover admin access (or prevent unauthorized access) to OS X-based devices.
OPINION: In his RSA 2015 keynote on national cybersecurity threats, Homeland Security head Jeh Johnson told an audience of cybsersecurity experts something so wildly impossible, it almost went unnoticed.
Technology can't replace the value of online safety education, the key to keeping kids out of predators' paths, panelists shared.
21 hours ago Russian Hackers Read Obama Emails: ReportSecurityWeek View Synopsis+1
Emails to and from President Barack Obama were read by Russian hackers last year in a breach of the White House's unclassified computer system, The New York Times said Saturday.
18 hours ago Agile versus ArchitectureIT Toolbox Blogs View Synopsis+1
Agile and Architecture seemed to be, rightly or wrongly, often discussed together today. Should Enterprise Architecture be Agile? This is the question we all ask in fact.
Let's go back to basics.
Agile is the developer's way to do more work with
Hackers didn't breach classified servers, but the close call chilled staffers.
It's very common these days for tech companies Google and Microsoft to offer hackers and security researchers big bucks if they're able to find security vulnerabilities that could pose serious threats to important software and services. Google in particular often hosts its own hacking competition whereÂ the search giant puts millions of dollarsÂ on the line for anyone savvy enough to skirt around Google's built-in security schemes. Recently, one security researcher found a number of high-level vulnerabilities on Groupon's website. Groupon promptly patched the security holes but, as it turns out, is refusingÂ to pay him. Here's why. DON'T MISS:Â Google Maps trolls Apple in the most unbelievably inappropriate way A security researcher who goes by the name BruteLogic recently uncovered upwards of 32
When you don't differentiate between good and bad hackers, you have a problem.
The oil price decline is prompting a rethink in terms of process efficiencies and adoption of IT services management across the energy spectrum, including the slower movers at big oil firms. Envision a centralized single IT platform combining the execution of tasks as diverse as scheduling of rig maintenance, deployment [...]
FTC tsks at startup promising an opt-out that was invisible to millions of citizens
The FTC has now settled with a New York startup that stealthily tracks the movements of Americans around stores using their smartphones' Wi-Fi signals.
1 hour ago Better PasswordsIT Toolbox Blogs View Synopsis+1
Passwords are not the best method of authenticating users on a network, but they are the most commonly used method. They are easier and less expensive to implement and use than most of the alternatives, and are definitely better than no authenticatio...
2 hours ago Collaborate 15 #C15LV Preview: Business Process Transformation: ROI is Dead, Long Live ROA - Part Four: Business Process TransformationIT Toolbox Blogs View Synopsis+1
When talking with CIOs, I like to ask key questions about their current state that have to do with the degree of control that they and the IT department has over business processes.
Barcode scanners vs QR code / smartphone combination vs mobile computers for inventory and asset management.