Security

Security vendor blackmailed.
Jeep Cherokee now patched, but all IoT cars vulnerable.
Unless Ashley Madison is shut down.
Security vendor hacks three politicians to prove a point 
 
Google provides physical security key for business customers 
 
Apple's App Store approves deliberately malicious app 
Researchers make a point as OS X, iOS vulnerabilities go unpatched.
 
The eight most dangerous cloud apps for business 
'Shadow IT' is scary and it's everywhere.
 
Webmail users hand over 'forgot password' codes to scammers 
Two-factor authentication useless against social engineering.
 
Samsung Galaxy devices at risk of eavesdropping 
 
Mac malware can survive hard disk formatting 
Symantec warns Apple users not to be complacent.
 
Second Chinese security vendor caught cheating 
 
ThinkPad vulnerable in latest Lenovo scare 
Hackers could replace legitimate apps with malicious ones.
 
New 'Rombertik' malware destroys computer if detected 
 
Security vendor cheats in anti-virus test 
Chinese firm Qihoo 360 stripped of certifications.
 
25 security innovations unveiled at RSA 2015 
 
Australian security vendor launches into USA 
Tier 3 uses new name for Stateside push.
 
Australian IT duo tackle Minecraft addiction 
KoalaSafe invents home network device to control children's internet use.
 
Dell enters crowded endpoint security market 
Up against Symantec, Sophos and hungry startups.
 
Seventy percent of malicious files go undetected by antivirus 
 
Canon buys IP surveillance leader Axis for $2.8bn 
Japanese camera giant to become market leader overnight.
Sign up to receive CRN email bulletins
   FOLLOW US...
Polls
Which type of channel conflict annoys you the most?




Latest Comments
CRN Magazine

Issue: 340 | July 2015

CRN Magazine looks in-depth at the emerging issues and developments for the channel, and provides insight, analysis and strategic information to help resellers better run their businesses.