Endpoint security
-
News
29 Apr 2025
Kaspersky calls for cyber immunity amid growing cyber threats
The rise of professional cyber crime groups and state-sponsored actors targeting critical infrastructure requires a move towards inherently secure ‘cyber immune’ systems, says Kaspersky CEO Eugene Kaspersky Continue Reading
By- Aaron Tan, TechTarget
-
Opinion
23 Apr 2025
Rethink authentication to remove the burden on users
The rise of AI powered threats and non-human identities will push an already strained identity security model over the edge Continue Reading
-
News
21 Jul 2016
Mobile payments get Isaca’s security approval
Mobile contactless payments enable three key security controls that make them more secure than physical and e-commerce payments, according to a report by Isaca Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2016
Carbon Black bets on next-generation antivirus
Carbon Black is betting on next-generation antivirus technology by acquiring Confer to extend the capability and appeal of its endpoint protection offerings Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Jul 2016
IBM sets up security centre in Canberra
IBM leads the charge as large private businesses invest heavily in security resources across Australia in an attempt to close the security gap Continue Reading
-
E-Zine
07 Jul 2016
CW ASEAN: July 2016
Lessons from the Philippine government hack: In this issue we ask why a hack on the Philippine Commission on the Elections (Comelec) was allowed to happen and what organisations in Southeast Asia can learn from this breach of security. Retailers in the region are concerned – read how the theft of customer data is their biggest worry. Continue Reading
-
E-Zine
07 Jul 2016
CW ANZ: July 2016
Australia knows it has a cyber security problem, but not the scale. In this month’s CW ANZ we describe how Australia's $230m security strategy serves as a wake-up call to enterprises. We also reveal the techniques and technologies being used to protect one Australian school, as well as a more general look at the main cyber threats to orgainsations in Australia. Read the issue now. Continue Reading
-
News
29 Jun 2016
Lauri Love may be faking mental illness claims lawyer for US
Prosecution lawyer Peter Caldwell questions whether activist Lauri Love is exaggerating mental health problems to avoid extradition to face hacking charges in the US Continue Reading
By- Fiona O’Cleirigh and Bill Goodwin
-
News
21 Jun 2016
Enterprises urged not to view security as a barrier to internet of things adoption
The Lower Colorado River Authority’s chief administrative officer urges enterprises to balance the risks of using the internet of things with the benefits connected devices can bring Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
20 Jun 2016
Lower average cost of Australian data breaches is not a sign of comfort
The average cost of a data breach to Australian organisations dropped in 2015, according to research Continue Reading
-
News
14 Jun 2016
Shadow data and the risks posed by cloud storage and apps
Cloud storage and apps can open up an organisation to risks of data leakage. Computer Weekly looks at key areas of vulnerability and what you can do to prevent your data going viral Continue Reading
By- Bryan Betts, Freeform Dynamics
-
News
12 Jun 2016
Philippines government data breach is a warning to Asean region
Security is a rising concern in the Asean region, with fears fuelled by incidents such as the recent hacking incident in Manila Continue Reading
By -
News
07 Jun 2016
Internet traffic to triple by 2020, says Cisco
The latest edition of Cisco’s Visual Networking Index predicts a near tripling of internet traffic during the coming years as more than a billion people come online Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
01 Jun 2016
My first IoT project: A guide for businesses
We’ve all had a good giggle about having our fridges hacked – but now it’s time to get real. What are the first steps enterprises should take when implementing their first internet of things project? Continue Reading
By -
News
25 May 2016
A new wave of cyber attacks targets the Middle East’s banks
Hot on the heels of the Qatar National Bank breach comes a campaign employing advanced social engineering techniques Continue Reading
By- Tom Paye
-
E-Zine
17 May 2016
Countdown begins to new EU data protection rules
In this week’s Computer Weekly, with the new EU data protection rules ready to become law, firms now have just two years to prepare for the stringent regulations – we assess the challenges. Manufacturing giant Rolls-Royce talks about why it moved its HR systems to the cloud and the lessons it learned. And we look back at 50 years of technology innovation in storage. Read the issue now. Continue Reading
-
News
09 May 2016
Australian health sector an easy target for cyber criminals, says IBM
A push to encourage greater adoption of electronic health records has raised the spectre of online record theft Continue Reading
-
News
29 Apr 2016
Cyber security in Belgium will gain prominence after terror attacks
Belgium’s physical security has been branded inadequate, so how does the country’s cyber security measure up? Continue Reading
By- Stef Gyssels
-
News
28 Apr 2016
Technology moving too fast for governments to keep up, says former Darpa chief
Former US defence technology chief supports encryption and privacy, despite intelligence services’ fears Continue Reading
-
News
27 Apr 2016
IPv6 alone will not secure IoT, warns GE CISO
It is important for all users of the internet of things to understand what they are getting into with IPv6, and to be aware of the risks and myths, says GE CISO Hanns Proenen Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Apr 2016
Israeli volunteers ready their cyber defences as Anonymous affiliates attack
Every April, Israel braces itself for an onslaught from pro-Palestinian hackers, but the occupants of a small conference room in Tel Aviv stand in their way Continue Reading
By- Niv Lilien
-
News
31 Mar 2016
DDoS attacks on universities normally performed by “disgruntled” students or employees
The majority of distributed denial of service attacks on universities are made by students or employees, says the head of infrastructure services at the University of London Continue Reading
By- Clare McDonald, Business Editor
-
News
31 Mar 2016
Adwind at centre of cyber attack on Singapore bank
Kaspersky Lab has revealed that the Adwind malware-as-a-service platform was at the centre of an attack on a Singapore bank Continue Reading
By -
News
29 Mar 2016
Apple vows to raise security as FBI breaks into iPhone
Apple says it will help law enforcement with investigations, but will increase the security of its products after the FBI broke into an iPhone Continue Reading
-
News
24 Mar 2016
Businesses urged to update Apple software to dodge zero-day attacks
Security experts are urging Apple Mac, iPhone and iPad users to update their operating systems to avoid data-stealing attacks that exploit a new zero-day vulnerability Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Mar 2016
Australian girls believe online harassment is endemic
There are clear signals that online threats against women and attempts to invade their privacy are becoming societal norms in Australia Continue Reading
-
News
18 Mar 2016
Most students say cyber security is a growing threat
Some 70% of higher education students say they are aware that cyber crime and attacks are a threat, but less than half think security is their responsibility Continue Reading
By- Clare McDonald, Business Editor
-
E-Zine
08 Mar 2016
Building datacentres under the sea
In this week’s Computer Weekly, we look at Microsoft’s trial of an underwater datacentre and assess the technology and environmental implications of running cloud services under the sea. As PC suppliers build new products around Windows 10, we ask if the desktop PC is set to be reinvented. And with ransomware on the rise, we examine the threat of cyber extortion. Read the issue now. Continue Reading
-
Opinion
07 Mar 2016
The problem with passwords: how to make it easier for employees to stay secure
An organisation’s IT security can be compromised if staff do not follow a strict policy of using strong passwords to access internal systems Continue Reading
By- Jeremy Bergsman, CEB
-
E-Zine
23 Feb 2016
Surviving broadband failure
In this week’s Computer Weekly, after the recent BT broadband outage, we examine the options to keep your communications in place in the event of a failure, to ensure business continuity. We look at the prospects for the OpenStack open source cloud platform in the enterprise. And we see how Ireland is making progress on delivering a digital health service. Read the issue now. Continue Reading
-
News
18 Feb 2016
Mobile innovation shifts to smartphone services
As smartphone sales continue to stagnate, suppliers are looking to innovate in more novel ways Continue Reading
By- Alex Scroxton, Security Editor
-
News
12 Feb 2016
US IT professionals overconfident in cyber attack detection, study finds
Most US IT professionals are confident in key security controls to detect cyber attacks – but unsure how long it would take automated tools to discover a breach Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
09 Feb 2016
How software protects people
In this week’s Computer Weekly, we find out how software is helping to maintain safety in high-risk sectors like oil & gas, aerospace and healthcare – and what lessons they hold for other organisations. We offer six tips from CIOs for innovation with data. And after the HSBC cyber attack, we examine the continuing threat to businesses from distributed denial of service (DDoS) attacks. Read the issue now. Continue Reading
-
News
29 Jan 2016
HSBC online services hit by DDoS attack
HSBC was hit by a distributed denial of service (DDoS) attack, which targeted its online personal banking services. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
21 Jan 2016
CW Europe - January 2016
This month, CW Europe looks in-depth at an issue that is set to affect people across all 28 European Union member states – the abolition of mobile roaming charges, set for mid-2017. Continue Reading
-
News
21 Jan 2016
Candy Crush maker King secures mobile access through cloud
Candy Crush maker King.com uses cloud-based Duo Security authentication for access to cloud services, customised apps and remote VPNs Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jan 2016
Most Android devices running outdated versions
Nearly a third of Android devices in enterprises today are running version 4.0 or older of the operating system, leaving them highly susceptible to vulnerabilities, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Dec 2015
UK firms act quickly to fix payment card data encryption
Security firm found that 16 global companies had failed to effectively encrypt traffic to the payment portion of their websites and apps Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Dec 2015
Cyber attacks an increasing concern for Asean countries
Organisations in the Association of Southeast Asian Nations are increasingly the targets for cyber criminals, according to a report focused on the region Continue Reading
By -
News
27 Nov 2015
Word ‘smart’ being abused by IoT advocates
Speakers at an event hosted by Cambridge Wireless say the term ‘smart’ is overused to describe connected devices on the internet of things Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Nov 2015
Coalition of top tech firms opposes weakened encryption
Weakening security with the aim of advancing security simply does not make sense, a coalition of top tech firms tells US president Barack Obama Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Nov 2015
Cyber security mindset needs to change, says report
Government organisations are prime targets for cyber attacks, leading to increased importance on robust information security, according to a report by Intel Security and the Digital Government Security Forum Continue Reading
By -
Feature
15 Oct 2015
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
News
09 Oct 2015
Apple removes more iOS apps over security concerns
Apple has blocked more apps over security concerns just weeks after ridding the App Store of XcodeGhost malware Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
21 Sep 2015
How cloud technology helps kittens
In this week's Computer Weekly, we talk to the CIO at the UK's leading animal charity, the RSPCA, about how her cloud-first strategy is helping animal welfare. Microsoft is ending support for older version of Internet Explorer – we assess the implications. And we ask the experts about the best practice in mobile security. Read the issue now. Continue Reading
-
News
18 Sep 2015
Public-private co-operation in the Nordics tackles growing cyber crime threat
Nordic governments and businesses are putting cyber security at the centre of their planning as threats increase Continue Reading
By -
News
16 Sep 2015
BT launches ethical hacking service for bankers
BT introduces a certified Crest Star ethical hacking test service for financial services customers Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Sep 2015
Researchers discover Android PIN locker ransomware
Researchers say LockerPIN is a self-defending, aggressive piece of ransomware currently targeting Android devices, mainly in the US Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Sep 2015
Use 2FA to mitigate KeyRaider iOS malware, says Rapid7
KeyRaider iOS malware targeting iPhone users in China and 17 other countries including the UK has raised enterprise security concerns Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Jul 2015
Anyone still running Windows Server 2003 is now at risk
Businesses still running Windows server 2003 are vulnerable to attack from hackers looking to exploit security holes Continue Reading
By- Cliff Saran, Managing Editor
-
News
14 Jul 2015
Symantec bets on simplicity, cloud and mobile
Symantec is not trying to be all things to all people, but is instead focusing on threats and protecting information in the mobile and cloud environments Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jul 2015
The internet of things could save the honeybee from extinction
Gemalto’s M2M unit is developing an ambitious project with agricultural science firm Eltopia and the University of Minnesota. The objective: to save the honeybee from extinction Continue Reading
By- Alex Scroxton, Security Editor
-
News
03 Jul 2015
Wi-Fi enhances guest experience and profitability for Belgian theme park
Bobbejaanland, one of the largest theme parks in Belgium, is using a Fortinet Wi-Fi network to offer visitors access on the go, and improve its management capabilities Continue Reading
By- Xavier Mertens
-
News
29 Jun 2015
Cisco launches IoT System for enterprise and smart cities
Cisco unveils 15 products to address the growing complexity of internet of things deployments Continue Reading
By- Alex Scroxton, Security Editor
-
News
22 Jun 2015
Government Digital Service insists Verify safe despite claims of vulnerabilities
An academic paper suggests the Gov.uk Verify system could be used as a spy network, but the Government Digital Service (GDS) insists this is not the case Continue Reading
By- Clare McDonald, Business Editor
- Guide 30 May 2015
-
News
29 May 2015
Google announces security features for Android
Google announces better app permission controls and other Android security changes at its Google I/O developer conference Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 May 2015
Wi-Fi Global Congress: Hotspot 2.0 standard addresses wireless security holes
At Wi-Fi Global Congress, Ruckus Wireless announces it will be first to market with the second release of Hotspot 2.0 Continue Reading
By- Alex Scroxton, Security Editor
-
E-Zine
05 May 2015
UK election special – who wins the digital vote?
In this week’s Computer Weekly, as the UK goes to the polls in the general election, we take an in-depth look at the political parties’ manifestos for technology, and examine what the IT sector wants from the next government. Our latest buyer’s guide covers collaboration software. And we analyse host identity protocol (HIP), an emerging standard for endpoint security. Read the issue now. Continue Reading
-
Feature
27 Apr 2015
Top tips for remote and mobile workers to improve their cyber security
Steps remote and mobile workers can take to improve cyber security on mobile devices, using public Wi-Fi and computers, and handling USB devices Continue Reading
By- Peter Wood, First Base Technologies LLP
-
Feature
25 Apr 2015
Bill Binney, the ‘original’ NSA whistleblower, on Snowden, 9/11 and illegal surveillance
Always a patriot: Computer Weekly talks to Bill Binney, the senior NSA official who blew the whistle before Edward Snowden Continue Reading
-
News
23 Apr 2015
Mobile malware overhyped, says security company Damballa
Mobile internet users are 1.3 times more likely to get struck by lightning than infected by mobile malware, research by security firm Damballa finds Continue Reading
By- Warwick Ashford, Senior analyst
-
News
14 Apr 2015
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers Continue Reading
By- Alex Scroxton, Security Editor
-
Feature
01 Apr 2015
Mobile device management (MDM) vs backup
MDM tackles the challenge of mobile devices flooding the enterprise, but it doesn’t mean you can stop worrying about mobile data protection Continue Reading
By -
News
26 Mar 2015
Samsung targets business with Microsoft tools integration
Samsung has pre-installed Microsoft OneNote, OneDrive, and Skype on the new Galaxy S6 and Galaxy S6 edge, as it expands into business Continue Reading
By- Cliff Saran, Managing Editor
-
News
13 Mar 2015
Lookout bets on big data analytics to secure enterprise mobiles
Mobile security SaaS provider Lookout is betting on its cloud-based big data analytics capability to attract enterprise customers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Feb 2015
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system Continue Reading
-
News
20 Feb 2015
BlackBerry 10.3.1 review: Access Android apps and Blend
BlackBerry has finally released version 10.3.1 of its mobile operating system, which gives access to the Amazon Android app store Continue Reading
By- Cliff Saran, Managing Editor
-
News
06 Feb 2015
Symantec continues cloud investment in spite of poor Q3 results
Symantec has reported third quarter 2015 revenue of $1.64bn, a drop of 4% compared with $1.70bn over the same period in 2014 Continue Reading
By- Cliff Saran, Managing Editor
-
E-Zine
26 Jan 2015
Why we need cyber war games
In this week’s Computer Weekly, the UK and US are starting a cyber war on each other – all in the name of testing each other’s defences. We look at why the cyber war games are needed. We examine what IT managers can learn from the car industry to improve supplier relationship management. And we find out why innovation should be top of the IT agenda in 2015. Read the issue now. Continue Reading
-
News
20 Jan 2015
Younger users prefer biometrics to passwords
Younger bank customers would rather use biometrics than PINs and passwords for security, according to Visa Europe Continue Reading
By- Clare McDonald, Business Editor
-
E-Zine
05 Jan 2015
CW Europe – January 2015 Edition
As we start another new year we look back at what technology has been playing a vital role in keeping Europe safe. Headlines are regularly filled with threats about cyber wars and attacks which, although are important to bring to light, can sometimes overshadow the role technology plays in keeping us safe. Continue Reading
-
News
05 Jan 2015
Hackers can exploit free mobile apps to steal data, study shows
Hackers can access private data by exploiting vulnerabilities mainly in free mobile apps, according to security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Dec 2014
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
Feature
11 Dec 2014
The state of mobile back end as a service
Common mobile application services are increasingly being hosted on central back-end servers – but what does that mean for the enterprise? Continue Reading
By- Janakiram MSV
-
News
04 Dec 2014
Cyber criminals are targeting smartphone supply chains, warn researchers
A new mobile trojan dubbed “DeathRing” is being pre-loaded onto smartphones somewhere in the supply chain, warn researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Nov 2014
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Photo Story
31 Oct 2014
The real story behind The Imitation Game film
The life of Alan Turing is being celebrated on the big screen this month. The Imitation Game from Studio Canal opens on November 14th 2014 and tells the story of the war hero who’s achievements until recently were largely unknown. Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
13 Oct 2014
Embedded SIMs key to unlocking internet of things
GSMA’s eUICC Embedded SIM Specification will help M2M communications and the IoT become mainstream, say analysts Continue Reading
By- Alex Scroxton, Security Editor
-
News
10 Oct 2014
Azure CTO Mark Russinovich's top ten public cloud security risks
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
08 Oct 2014
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
24 Sep 2014
BlackBerry Passport delivers a real keyboard and high-res screen to business
BlackBerry has introduced its Passport smartphone featuring a 4.5in hi-res screen, a qwerty keyboard and 13MP camera Continue Reading
By- Cliff Saran, Managing Editor
-
News
15 Sep 2014
Salesforce issues advice on avoiding Dyreza attack
Salesforce has issued a set of guidelines on tightening security after a number of its customers were targeted by the Dyreza email virus Continue Reading
By- Cliff Saran, Managing Editor
-
News
09 Sep 2014
EY seeks tech startups to address challenges of right to be forgotten
Professional services firm Ernst & Young is looking for startups to find technology solutions to the ‘right to be forgotten’ regulation Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
08 Sep 2014
Ransomware on the rise, warns cyber threat report
The first half of 2014 saw an increase in online attacks that lock up user data and hold it for ransom, reports F-Secure Labs Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Sep 2014
Barclays bank launches biometric authentication
Barclays bank plans to launch biometric readers that read users' finger veins to authenticate customers Continue Reading
By- Clare McDonald, Business Editor
-
Feature
20 Aug 2014
The internet of things is coming: Is your datacentre ready?
Gartner estimates the IoT will see 26 billion units installed by 2020 – channelling huge volumes of data traffic into datacentres Continue Reading
-
Feature
18 Aug 2014
What ingredients go into the successful app store?
An enterprise app store should provide the controlled availability of apps for employees.We look at what is available for organisations to use Continue Reading
By- Bernt Ostergaard , Quocirca
-
News
11 Aug 2014
USB-connected devices present cyber vulnerabilities
Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
05 Aug 2014
Cyber Security Challenge UK takes on the internet of things
The latest level of the Cyber Security Challenge will involve participants hacking devices connected to the internet of things Continue Reading
By- Clare McDonald, Business Editor
-
E-Zine
04 Aug 2014
Driving virtualisation into pole position in Formula One
In this week’s Computer Weekly, we find out how the Caterham F1 team has used virtualisation in its trackside technology to help improve race performance. We analyse how growing competition in the cloud market is affecting Amazon Web Services’ dominant position. And we look at silicon photonics, an emerging datacentre technology that promises better connectivity and reduced complexity. Read the issue now. Continue Reading
-
E-Zine
28 Jul 2014
Going mobile in financial services
In this week’s Computer Weekly, in a highly-regulated sector such as financial services, enabling staff mobility is a challenge – we hear from IT leaders that have made it work. We ask why small businesses are so poorly prepared for cyber attacks. And we examine the key storage technologies in the Openstack cloud platform. Read the issue now. Continue Reading
-
E-Zine
21 Jul 2014
Time to get serious about endpoint security
In this week’s Computer Weekly, with billions of devices joining corporate networks every year, our latest buyer’s guide looks at endpoint security. IBM and Apple have announced plans to work together on corporate mobility – we analyse what the deal means for IT leaders. And we take an in-depth look at in-memory databases. Read the issue now. Continue Reading
-
News
16 Jul 2014
IBM partners with Apple to deliver enterprise services for iOS
IBM has given Apple a major boost in the enterprise, through a partnership that will see it provide services and software for iOS Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
14 Jul 2014
A guide to smart home automation
Unless it is a new build, the challenge in creating a smart home is that technology must work irrespective of the age of the property Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
07 Jul 2014
The pros and cons of iPads in the enterprise
The iPad is often the first platform for which developers produce apps – but it is substantially more expensive than its competitors Continue Reading
By- JP Gownder
-
News
04 Jul 2014
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit Continue Reading
-
News
03 Jul 2014
Netflix releases its AWS monitoring tool Security Monkey into the wild
Netflix has made Security Monkey, the AWS tracker tool it built for itself, freely available to other Amazon cloud users Continue Reading
By- Archana Venkatraman, Datacentre Editor
-
News
03 Jul 2014
Facebook apologises over psychological experiments
Facebook has apologised over the controversial psychological experiments carried out on 689,000 users without their consent in 2012 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Jun 2014
IT departments unprepared for internet of things
Only 41% of IT professionals are working on projects to prepare their business for the internet of things Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
27 May 2014
Android Outlook app has privacy issues, warn researchers
Microsoft’s Outlook.com app for Android is exposing users' data, warn security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 May 2014
Shell thinks technology first in preparation for internet of everything
Shell is reshaping its business to think technology first as it uses the internet of everything to change its business processes Continue Reading
By- Caroline Baldwin, Freelance editor and journalist