|
White Paper: Wombat Security Technologies Our annual State of the Phish research reports found that phishing attacks continue to grow in volume and complexity, supported by more aggressive social engineering practices that make phishing more difficult to prevent. Key findings include data on personalized spear phishing, industry breakdown, and endpoint vulnerability. Read More ▶ |
Hewlett Packard Enterprise has been awarded $3 billion in a lawsuit against Oracle over a largely forgotten Intel processor. Read More ▶ |
|
Because patient information can be so lucrative, healthcare organizations and insurance companies are being targeted by hackers and should expect to eventually suffer a security breach. Read More ▶ |
|
Malware that secretly installs porn apps on your phone is infecting devices by the millions, becoming the world’s largest mobile Trojan. Read More ▶ |
|
|
Federal regulators are investigating Tesla's autopilot feature after a fatal crash involving a tractor trailer and one of its Model S cars. Read More ▶ |
|
Older Eyefi networked flash cards will become the next IoT devices to effectively die in consumers’ hands when the company cuts off support for its older models in September. Read More ▶ |
|
Microsoft Monday announced that customers can purchase a joint licensing agreement for its Operations Management Suite cloud management product and it’s popular on-premises infrastructure manager, Systems Center. Read More ▶ |
|
The hacker who claims to have breached the Democratic National Committee’s networks is trying to beat back accusations that he’s linked with the Russian government. Read More ▶ |
|
Paper, Facebook's last Creative Labs experiment, is now gone, but I'll never forget it. Read More ▶ |
|
Watson might schedule your meetings someday if a partnership between IBM and Cisco Systems bears the fruit they’re hoping to grow. In the meantime, the companies hope to save employees from some of the meaningless tasks they have to carry out just to work with their colleagues. Read More ▶ |
|
LizardStresser, the DDoS malware for Linux systems written by the infamous Lizard Squad attacker group, was used over the past year to create over 100 botnets, some built almost exclusively from compromised internet-of-things devices. Read More ▶ |
|
Dell has stopped selling its last Android devices as it washes its hand of pure tablets and focuses more on Windows 2-in-1 devices. Read More ▶ |
|
One of the challenges on the way to realizing the benefits of quantum computing is finding a way to compactly assemble and then precisely control enough quantum bits, or "qubits," to deliver on the technology's enormous processing potential. Researchers at Penn State University said they've made a big advance. Read More ▶ |
|
The PC upgrade cycle has slowed down to every five to six years, and HP's trying a new service model to sell PCs and devices at a faster pace. Read More ▶ |
|
We round up the latest rumors on Samsung's next phone-tablet hybrid device. Read More ▶ |
|
White Paper: Wombat Security Technologies Aberdeen's Monte Carlo analysis quantifies the positive impact of investments in user awareness and training and shows that Wombat's security awareness solutions reduce business risk and impact by up to 60%. Read More ▶ |