What Jennifer Lawrence can teach you about security
Following the leak of private photos and videos of multiple well-known actresses this weekend, Apple has come under fire for an alleged breach of security of its iCloud service. But what if Apple isn't to blame? And how can you keep yourself safe?
The Wild Wild Google Play
The wild, wild west. That's as accurate a description as we can give for Google Play (formerly known as Google's Android Market). But is it as untamed as we think it is, or is it a wild stallion that can be lulled into submission? We paint you the current landscape and pointers to stay safe.
Cloud: The Next Security Frontier
The advent of cloud computing and the proliferation of smartphones and tablet computers at the workplace have posed numerous challenges and opportunities for the enterprise security landscape. Here are some insights I gained at the recent Trend Micro CloudNext APAC media conference. As you might have guessed, the cloud plays an important role.
First Looks: Nio Security Tag
Afraid of losing your keys, bag or camera? The handy little nio security tag with a range of customizable settings offers a solution to keep your valuables safe.
The Science of Software Security, according to Microsoft
HWM/HardwareZone.com had the opportunity to visit the Microsoft Redmond office in late May and among other more serious (and technical) things, uncover stuff the team has done in the anti-malware department since the days of Nimda, Code Red and Slammer.