Major update to SharePoint provides improvements to performance, stability and security … continue reading
This process identifies and prioritizes risks before dealing with them, which should ease things for developers … continue reading
The breach occurred in a backup server, according to Adobe … continue reading
The breach was bigger than indicated, and for a while a portion of Photoshop’s code was freely available … continue reading
The maintenance that goes into public clouds makes them more reliable and harder to compromise … continue reading
It took the company two months to find (and admit to) the breach; stolen material included customer info and source code … continue reading
With a little patience, and a lot of high-resolution photos, laser printers and latex milk, criminals can crack your iPhone … continue reading
Companies that use Big Data products have to ensure security, or else; do not mistreat your open-source developers … continue reading
The problem lies in WebKit and involves using SMS texts or iMessages … continue reading
Large market share and open-source architecture put a hacker bullseye on Android’s back … continue reading
More security slip-ups lead to more black eyes, and the responses to the hacks haven’t been encouraging … continue reading
The fallout from the NSA reveals continues as the legal analysis site quits rather than be watched by the feds … continue reading