October 1, 2015 Want a Better Windows Encrypt? Take a Pass on TrueCrypt 2 min read - Looking for the best way to encrypt Windows drives? Take a pass on open-source TrueCrypt, which was recently found to have critical flaws.
September 23, 2015 Why Windows Devices Are Topping Mobile Malware Infection Rates at 80 Percent 2 min read - Mobile devices running the Windows mobile operating system make up 80 percent of all malware-infected hardware, recent research showed.
Endpoint September 15, 2015 The Impact of the End of Windows XP on Your Enterprise 3 min read - It wasn't all that long ago that Windows XP was present in the vast majority of enterprises. In fact, it's still prevalent, bringing many security risks.
September 3, 2015 Why the Browser Industry Is Collectively Saying Goodbye to RC4 Next Year 2 min read - Security-conscious browsers are planning to say goodbye to the RC4 algorithm by February 2016 in favor of more advanced encryption methods.
August 25, 2015 Amazon to Disable Flash Player in Hosted Ads 2 min read - Amazon is prohibiting ads using Flash Player for its site, which may be the final straw for organizations concerned about ongoing security risks.
Software Vulnerabilities August 24, 2015 Privacy and Windows 10: What’s in Your Settings? 3 min read - Windows 10 users should read the latest Microsoft privacy statement to fully understand what they're agreeing to when upgrading their operating system.
Endpoint August 12, 2015 I Know Everything About You! The Rise of the Intelligent Personal Assistant 3 min read - An intelligent personal assistant (IPA) can be of tremendous help to individuals, but it may pose a security risk if users aren't careful.
Endpoint August 7, 2015 Why Windows 10 Will Start Up Business Again 4 min read - The updated version of Windows 10 for mobile devices provides many opportunities for businesses looking to boost mobile security and efficiency.
August 5, 2015 Windows 10 Update: The Security Risks and Safeguards Everyone Should Know 2 min read - The Windows 10 update marks a major turning point for Microsoft. But while there are new safeguards, experts say there are also new threats.
Software Vulnerabilities August 3, 2015 MemGC: Use-After-Free Exploit Mitigation in Edge and IE on Windows 10 3 min read - When used effectively, MemGC could help reduce the number of use-after-free vulnerabilities that plague Edge and Internet Explorer in Windows.