What Jennifer Lawrence can teach you about security

What Jennifer Lawrence can teach you about security

Following the leak of private photos and videos of multiple well-known actresses this weekend, Apple has come under fire for an alleged breach of security of its iCloud service. But what if Apple isn't to blame? And how can you keep yourself safe?
The Wild Wild Google Play

The Wild Wild Google Play

The wild, wild west. That's as accurate a description as we can give for Google Play (formerly known as Google's Android Market). But is it as untamed as we think it is, or is it a wild stallion that can be lulled into submission? We paint you the current landscape and pointers to stay safe.
Cloud: The Next Security Frontier

Cloud: The Next Security Frontier

The advent of cloud computing and the proliferation of smartphones and tablet computers at the workplace have posed numerous challenges and opportunities for the enterprise security landscape. Here are some insights I gained at the recent Trend Micro CloudNext APAC media conference. As you might have guessed, the cloud plays an important role.
TenBu Nio Security Tag review

First Looks: Nio Security Tag

Afraid of losing your keys, bag or camera? The handy little nio security tag with a range of customizable settings offers a solution to keep your valuables safe.
The Science of Software Security, according to Microsoft

The Science of Software Security, according to Microsoft

HWM/HardwareZone.com had the opportunity to visit the Microsoft Redmond office in late May and among other more serious (and technical) things, uncover stuff the team has done in the anti-malware department since the days of Nimda, Code Red and Slammer.