Jeep Cherokee now patched, but all IoT cars vulnerable.
Unless Ashley Madison is shut down.
Beware of public wi-fi.
Google provides physical security key for business customers 
Apple's App Store approves deliberately malicious app 
Researchers make a point as OS X, iOS vulnerabilities go unpatched.
The eight most dangerous cloud apps for business 
'Shadow IT' is scary and it's everywhere.
Webmail users hand over 'forgot password' codes to scammers 
Two-factor authentication useless against social engineering.
Samsung Galaxy devices at risk of eavesdropping 
Mac malware can survive hard disk formatting 
Symantec warns Apple users not to be complacent.
Second Chinese security vendor caught cheating 
ThinkPad vulnerable in latest Lenovo scare 
Hackers could replace legitimate apps with malicious ones.
New 'Rombertik' malware destroys computer if detected 
Security vendor cheats in anti-virus test 
Chinese firm Qihoo 360 stripped of certifications.
25 security innovations unveiled at RSA 2015 
Australian security vendor launches into USA 
Tier 3 uses new name for Stateside push.
Australian IT duo tackle Minecraft addiction 
KoalaSafe invents home network device to control children's internet use.
Dell enters crowded endpoint security market 
Up against Symantec, Sophos and hungry startups.
Seventy percent of malicious files go undetected by antivirus 
Canon buys IP surveillance leader Axis for $2.8bn 
Japanese camera giant to become market leader overnight.
Review: Cyberoam CR10iNG 
A value-packed desktop UTM appliance.
Sign up to receive CRN email bulletins
What's the best way to deal with phoenix businesses?

Latest Comments
CRN Magazine

Issue: 340 | July 2015

CRN Magazine looks in-depth at the emerging issues and developments for the channel, and provides insight, analysis and strategic information to help resellers better run their businesses.