Salted Hash looks at recent Office 365 phishing examples, discussing why they work and what can be done about them.
A few simple swipes, and you're on your way to accessing the files and folders on your Android phone from your PC or Apple computer. JR Raphael walks you through these easy steps.
Our tech panel looks at how Uber (secretly) handled last year's hack and the controversy around Google's decision to track Android users' locations. Then it's time to discuss why AWS is selling off hardware in China and what Mozilla is up to with its...
Get your desktop at your fingertips with these easy, step-by-step instructions for setting up Google's Chrome Remote Desktop.
A solid backup policy and frequent awareness training can reduce the risk of ransomware, but unintentional breaches by insiders are still a worry for administrators. Watch as Steve Ragan and Michael Nadeau talk security strategy.
Alexa is the helpful voice in the Echo and Echo Dot that comes with a wide range of skills already available. But with a little coding, it can be made to do much more. IDG's Sharon Machlis explains.
The Matrix Banker malware, first found in Latin America, is now gaining a foothold in diversified targets. Steve Ragan breaks down the threat with Justin Fier, director for cyber intelligence and analysis at Darktrace.
Watch this instructional video to understand how a scrum master can help a team learn agile development and follow a scrum process to develop new applications
Would you give up a customer's data or credentials if that was the demand in a ransomware attack? That's just one of the nightmare scenarios that Steve Ragan and Rick McElroy talk about on this week's episode.
Apple's expensive new iPhone X has a lot going for it: Face ID security, an OLED display and, of course, iOS 11 – making it a top-notch option for enterprise users. But is it worth $1,149?
Learn about the latest networking technology, SD-WAN, which uses policy-based rules to orchestrate applications routing in the cloud. Jerry Kennelly, CEO of Riverbed, describes the functionality and benefits.
In this lively hourlong discussion, Maryfran Johnson, executive director of CIO programs for CIO Events and the CIO Executive Council, talks with Bernie Gracy, Chief Digital Officer of Agero, the largest provider of roadside assistance services to ca...
Get up to speed quickly on newcomer Rust, designed to create fast, system-level software. This two-minute animated explainer shows how Rust bypasses the vexing programming issues of memory and management.
What does it mean to be a security professional? CSO's Fahmida Rashid and Steve Ragan break down what it takes to get ahead in the field.
Computerworld Windows expert Preston Gralla walks you through the steps needed to easily repair a corrupted hard disk using the command line or PowerShell.
The Robo R2 3D printer, at a starting price of $1,500, combines a few excellent features with a fairly long list of downsides.
Does attack attribution really matter? CSO's Fahmida Rashid and Steve Ragan argue that what, when and how a breach happened are the most immediate concerns. Who did it comes later.
Get up to speed quickly on the potential use cases for blockchain technology, in industries such as healthcare, with Esmond Kane, deputy CISO at Partners Healthcare.
From Conficker to Zeus, these four malware threats continue to impact enterprises today. Watch this short video to learn where they're still lurking.
Look ahead to Europe's rollout of the the General Data Protection Regulation in May 2018, and its expected impact on data handling, with expert insights from Gary Southwell, vice president and general manager, products division, at CSPI.
In this exclusive webcast video, IDG executives outline some insider tips for winning prestigious awards for IT innovation, security or digital leadership.
CSO's Fahmida Rashid and Steve Ragan dig into the latest phishing attempts (and how to sidestep them), plus the debate over application security, and some cool new tools.
So much of security comes down to 4 little words: Keep it simple, stupid. CSO’s Steve Ragan and Fahmida Rashid explain why there’s no magical mystery cure for ransomware. Also, how much is data from the Equifax breach worth? (Hint: It's a whole l...
The networking industry's hottest new buzzword -- intent-based networking -- is the next evolution of network software management. Get up to speed fast with this visual explainer.
With the Equifax breach still making waves, the new Apple Watch now on wrists and A.I. seemingly everywhere, our panel digs into what's happening in the IT world.
Put your old Android device to work -- as a universal smart remote or remote camera, for example -- with these easy step-by-step instructions from Computerworld blogger JR Raphael.
Don't have an Android device? With the right set of apps, you can get Oreo-like features on just about any device with this step-by-step advice from Computerworld blogger JR Raphael.
Speed up your interactions with your Android phone using these easy slides and swipes, courtesy of Computerworld blogger and Android expert JR Raphael. (Tips in this video apply to devices with Android 8.0 Oreo or earlier.)
From notifications to picture-in-picture mode, walk step by step through the new features of Android's latest update with Computerworld blogger and Android expert JR Raphael.
Android blogger JR Raphael and Apple expert Michael deAgonia get ... animated, shall we say ... as they tackle the basics of which mobile OS is better when it comes to security, updates, app stores, customization and innovation. Can there really be o...
Android blogger JR Raphael gives us a rundown on the cool and useful new features in Android 8.0, better known as Oreo.
Apple on Tuesday unveiled its long-awaited smartphone line-up, with the new iPhone 8 and 8 Plus available later this month. But the flagship iPhone X – the one techies will really want – won't arrive until November.
Get a look at how the key features of Samsung's Galaxy S smartphone have evolved from its debut in 2010 to today's Galaxy S8 and S8+.
Reporters Fahmida Rashid and Steve Ragan talk about the latest ransomware threats, the holes in IT security and the burdens on enterprises.
Reporters Steve Ragan and Fahmida Rashid discuss the implications of the U.S. Cyber Command's recent elevation in status, putting it on the same level as the military’s other functional combatant commands.
Reporters Steve Ragan and Fahmida Rashid unpack the hottest topics in the security realm: Kaspersky Lab's Russia connection, the new status for the U.S. Cyber Command, Hollywood's hacking woes and ransomware.
Reporters Fahmida Rashid and Steve Ragan talk about hacks of Sony and more recently, HBO, and what lessons enterprises can learn from the entertainment industry's mistakes.
Reporters Fahmida Rashid and Steve Ragan talk about antivirus vendor Kaspersky Lab, a Russian-based company that various U.S. agencies have flagged as untrustworthy. Should you use it?
Our panel looks at whether smartwatch makers blew it by not focusing on the enterprise, why intent-based networking is the next big thing, whether GPS spoofing is real, and how high is too high when it comes to iPhone prices.
The panelists talk about their pricing predictions for the newest iPhone. Will this be the Apple device that gives consumers sticker shock?
The panelists break down Cisco's intent-based networking strategy, which brings machine learning to the networking realm. Plus, they hash out the ramifications for the security industry.
The panelists talk about GPS spoofing, and rumors about hacking as a factor in recent ship collisions. Plus, they sort out the difference between GPS spoofing and GPS jamming.
Ahead of the latest Apple smartwatch rollout, the panelists debate whether vendors made a mistake introducing smartwatches to consumers first, rather than pursuing the enterprise market.
See what puts the top 10 heavyweights in the enterprise networking space at the very top of their market.
Heading out on a trip? Check out these tips for keeping your data safe when you travel with a Mac.
Travelers carrying confidential or privileged corporate information need to take steps ahead of time to ensure that private data stays private. Watch this video for 6 quick tips.
The collaboration tool offers forward-thinking ways of sharing information, but never gained traction. Although it's being shuttered, some of those features met yet show up in other Microsoft products.
Perfect for IT, Python simplifies many kinds of work, from system automation to working in cutting-edge fields like machine learning
Watch how to safeguard corporate and personal data when traveling with recent Android-based phones and tablets, using the Chrome browser.
VMware CEO Pat Gelsinger talks about open source and container technology.