Critical vulnerability in Android's multimedia playback engine is easy to exploit, requires no user interaction, and affects 95 percent of Android devices. By Sara Peters Senior Editor at Dark Reading, 7/27/20150 comments | Read | Post a Comment
There is a direct correlation between how quickly an organization can identify and contain a data breach and the financial consequences that may result.By Stephen Treglia JD, HCISPP, Legal Counsel & HIPAA Compliance Officer- Investigations, Absolute Software, 7/27/20150 comments | Read | Post a Comment
A new report shows that the iPhone kill switch may not be as effective as first thought. What does this mean for other smartphone kill switches? By Eric Zeman , 7/27/20154 comments | Read | Post a Comment
Amazon's second-quarter earnings showed a small but unexpected profit. Some say the company is now worth more than the world's biggest brick-and-mortar retailer.By Charles Babcock Editor at Large, Cloud, 7/27/20153 comments | Read | Post a Comment
Google researchers have compared the security practices of experts to non-experts, and identified several ways that typical Internet users can improve their online security.By Thomas Claburn Editor at Large, Enterprise Mobility, 7/27/20153 comments | Read | Post a Comment
The highly anticipated launch of Windows 10 finally arrives on July 29. Here are 10 things you should know about the impending release.By Nathan Eddy Freelance Writer, 7/27/20152 comments | Read | Post a Comment
Sussex County, NJ, built a cloud-based virtual desktop infrastructure for a mobile workforce. The project earned the organization a spot in the 2015 InformationWeek Elite 100.By Curtis Franklin Jr. Executive Editor, Technical Content, 7/27/20151 Comment | Read | Post a Comment
Emerging software-defined WAN technologies overcome the limitations of traditional WAN design.By Dr. Jim Metzler Founder & Vice President, Ashton, Metzler & Associates, 7/27/20150 comments | Read | Post a Comment
Windows 10 brings functions and features that will change the Internet of Things for the enterprise and individuals.By Curtis Franklin Jr. Executive Editor, Technical Content, 7/26/20156 comments | Read | Post a Comment
Hours after the FCC gave final approval to the deal, AT&T announced it had completed its acquisition of DirecTV, a deal estimated at $49 billion. The integration of the two companies will occur over the coming months.By Nathan Eddy Freelance Writer, 7/26/20151 Comment | Read | Post a Comment
The Windows 10 ad campaign is not all that inspiring. It makes you wonder which marketing ideas were rejected.By David Wagner Executive Editor, Community & IT Life, 7/26/201519 comments | Read | Post a Comment
The July 29 rollout of Windows 10 is getting close, but the company's earnings fell short thanks to a $7.5 billion write-down from the Nokia deal.By InformationWeek Staff , 7/25/20153 comments | Read | Post a Comment
The Patent Starter Program is a controlled way for Google to allow a limited number of small companies to use what Google may not want or need, while helping startups protect themselves from patent trolls.By Larry Loeb Blogger, Informationweek, 7/25/20150 comments | Read | Post a Comment
Building a Mobile Business MindsetThe differences between mobile apps and conventional Windows clients, or even web applications, are far more than skin deep. Yes, the touch-versus-keyboard interface, APIs, and programming languages are new, but that’s arguably the easy part. There are profound differences in how the two are built, the functionality each prioritizes, the release cycles on which they’re developed — even the attitudes, values, and work styles of the developers creating them.
Dark Reading Threat Intelligence Survey Threat intelligence is the best way to stay ahead of new and complex attacks, say survey respondents. How analytics influences their IT security strategies varies.