Google says it provided tips and recommendations to over 90,000 developers on how they can fix security flaws in their applications before uploading their apps to Google Play.
Online retailer Amazon has been catching a fair amount of derision over its recently disclosed patent for an airborne fulfillment center that uses drones for delivery.
Amazon’s patent application, which was filed on April 5, 2016, describes how a blimp-like lighter-than-air aircraft would hover near potential markets carrying merchandise that would then be delivered by unmanned drones. Those drones would pick up merchandise that had been ordered by a customer below and then descend and deliver the purchase.
The Outthink Aging study identified three areas where cognitive computing can apply to the aging population, including Knowledge-as-a-Service (KaaS).
A report from Quick Heal outlines the top malware afflicting Windows and Android device users, and offers a brief description of each of the malware families.
The second quarter of 2016 saw a small decline in the detection count malware in both Google Android and Windows-based devices. However, this decrease should not be mistaken as a sign of weakness in cyber-criminals, according to a report from Quick Heal Technologies.
Only 18 percent of respondents in a recent Dell survey said that security has been included in all mobile, IoT, cloud and self-service initiatives. Security often is seen as a barrier to digital transformation among businesses, according to a survey of 631 IT decision-makers fielded by Dimensional Research and sponsored by Dell.
Nearly all (97 percent) of global respondents said they’re investing in digital technologies to transform their business, including mobile, cloud applications, cloud infrastructures and the internet of things (IoT).
New research published May 3 by SophosLabs reveals that even while attackers continue to design custom-tailored lures to exploit users, the inconvenient truth is that the most popular vulnerabilities are issues that have been patched years ago.
An overwhelming majority (94 percent) of active investment angels believe it helps to have subject-matter experts weigh in when they evaluate a startup investment opportunity, according to a Propel(x) survey of 200 aspiring and active angel investors in the United States.
Worries about security, interoperability and patient rights are complicating the health care industry’s transition to digital health care applications and electronic medical records.
HALF MOON BAY, Calif.—The need to move to modern computer technology including cloud computing to enable the transition to digital health care and medical records was a hot topic during a session here at the Constellation Research Connection Enterprise conference.
Many organizations still lack a clear strategy, an effective data governance model and effective budgeting models, a recent Deloitte study indicated.
Health system spending on analytics aligns with reported success in analytics, and respondents agree that analytics investment is essential for value-based care (VBC), according to a survey from the Deloitte Center for Health Solutions.
A quick training session after a network breach is a good idea, but the Joint Chiefs of Staff need to apply military practices to solving their phishing problem.
When the offices of the Joint Chiefs of Staff at the Pentagon were hacked three weeks ago, the hackers, who were apparently from Russia, harvested a trove of unclassified but sensitive data.
Security researcher Chris Roberts’ claim that he was able to hack into some of an airliner’s flight controls through its entertainment electronics shouldn’t be dismissed out of hand.
By now you’ve likely heard the denials about how a well-known hacker was able to break into an airliner’s flight control systems from within the passenger cabin, and about the resulting FBI investigation.
Heartland, one of the largest retail payment processors in the U.S., has “total confidence” in E3 encryption and so is getting into the breach insurance business.
Heartland Payment Systems is so confident in the security of its payment processing technology that, on Jan. 12, it announced a new breach warranty for its users. The warranty program will reimburse merchants for costs incurred from a data breach that involves the Heartland Secure credit card payment processing system.
Despite widespread security concerns, consumers in the 20-40 age group are ubiquitous users of digital technology across multiple mobile platforms. Because of their technology usage, they are more exposed to divulging sensitive information online, and have given up on the idea of total digital privacy.
Microsoft’s new Azure service aims at the Internet of Things with no regard for underlying device operating systems.
Microsoft announced a limited public preview of the Microsoft Azure Intelligent Systems Service (ISS), a new service that targets the Internet of Things (IoT).
This new Azure service helps customers embrace the Internet of Things and securely connect to, manage and capture machine-generated data from sensors and devices, regardless of the underlying operating system.
IBM has pledged to commit $1.2 billion to significantly expand its global cloud footprint, beefing up its SoftLayer infrastructure and other components.
Big Blue said the investment includes a network of cloud centers designed to bring clients greater flexibility, transparency and control over how they manage their data, run their business and deploy their IT operations locally in the cloud.
Despite 80 percent of respondents agreeing that bring your own device (BYOD) is the “new normal”, only 45 percent have a formal BYOD policy in their workplace and only 51 percent were considering Desktop-as-a-Service (DaaS) as a solution to access data from their mobile devices, according to a survey of more than 700 IT decision makers by managed cloud services provider NaviSite.