News & Highlights Archive
News & Highlights
(Source: Networks Asia) Who can blame anyone for mistrusting everything when it comes to cyber security? No one’s personally identifiable information (PII) is safe. Companies can’t count on the integrity
Read More
News & Highlights
(Source: IT Jungle) HelpSystems, well known for its IBM i security software, has acquired Fox Technologies, a company that specializes in security for Linux and Unix systems. With the acquisition, HelpSystems broadens
Read More
News & Highlights
(Source: IT Jungle) Syncsort significantly beefed up its security bona fides last month after we went on holiday hiatus when it acquired Cilasoft, an IBM i security software company based in France that also
Read More
News & Highlights
(Source: New York Times) Intel was privately informed of the issues by security researchers in June. The company, which has rejected doing a chip recall or other costly remedies, said it
Read More
News & Highlights
(Source: CNET) The extra security from an industry leader like McAfee is a big draw. You get a five-year license for parental controls and a two-year license for the McAfee software, which
Read More
News & Highlights
(Source: ZDNet) By the time CES 2018 wraps up it’s likely that you’ll hear the term “5G” so much that it’ll seem like next-generation speedy wireless service is already
Read More
News & Highlights
(Source: IT PRO) London-based mobile security firm Wandera recently analysed the battery performance of Apple’s latest operating system, and found that an iPhone would completely empty in under 96 minutes. As
Read More
News & Highlights
(Source: Top Tech News) Mobile users who thought they were unaffected by the Meltdown flaw affecting Intel chips are suddenly not quite so secure. A second flaw, dubbed Spectre, has been discovered
Read More
News & Highlights
(Source: TEISS) A team of security researchers uncovered 36 ‘mobile security apps’ on the Google Play Store that were secretly harvesting user data and aggressively pushing advertisements.
Read More
News & Highlights
(Source: SecurityInfoWatch) As they gain acceptance across the industry, mobile credentials, hosted solutions and intelligent locking systems will contribute to more streamlined, technologically advanced hardware and software solutions. End-users, integrators and
Read More