Apple Pay is poised to turn how we pay for goods at a retail store on its head. The new Apple Pay system lets you make purchases with the cards in your iTunes Store account. When you bring your iPhone 6 near an NFC-equipped payment terminal, you'll see your cards in Passbook, and you can authorize a transaction with the Touch ID fingerprint reader. That's it, you're done, and none of your sensitive credit card information was ever shared directly with the merchant.
John Brandon |
20 Oct |
Read more
The IT industry has an answer to almost every security problem. Need to lock down an app server to ward off hackers? There's likely a product available for that. Same goes for making sure a stolen Android phone uses strong authentication to keep a hacker from stealing data.
John Brandon |
08 Oct |
Read more
WHIR-HONK, WHIR-HONK, WHIR-HONK...that's the sound of a 2015 Cadillac Escalade going ballistic. It doesn't matter if you're a real thief or a three-foot stuffed bear--the Escalade's new motion-sensing technology can stop someone from stealing your stuff (or the SUV itself)--or at least deafen them in the process.
John Brandon |
13 Aug |
Read more
Criminals get a little more sophisticated every day. Fortunately, so does video surveillance technology. Here are five options to consider for your business, no matter the size.
John Brandon |
18 Jun |
Read more
By and large, the major websites hit by Heartbleed have recovered. So have the bad guys, who are undoubtedly plotting their next move. Here, security experts offer their take on five large-scale, Heartbleed-level vulnerabilities for which CIOs should prepare.
John Brandon |
10 Jun |
Read more
BlackBerry 10 smartphone sales have been disappointing, and this month the company announced that it's essentially up for sale. Bad news aside, five key industry trends suggest that BlackBerry's purported advantages no longer matter.
John Brandon |
27 Aug |
Read more
Hardly a day goes by without a new security threat emerging. Traditional security tools aren't always up to the task of keeping sensitive business information in safe hands. These six innovations will help you stay a step ahead.
John Brandon |
26 Mar |
Read more
Which technologies and products will be put out to pasture in 2013? Some are no-brainers, some others might say are poised for a comeback and a couple might surprise you.
John Brandon |
19 Dec |
Read more
What's in store for 2013? IT professionals need to be prepared for a mix of old (biometrics), new (3-D printing), borrowed (apps for watching TV) and blue (unemployed skeuomorphic designers).
John Brandon |
18 Dec |
Read more
Java hacks, VPN hacks, firewall hacks and even hotel room key hacks. Nothing is safe anymore, judging from an analysis of presentations at Black Hat and Defcon this summer. The lesson for enterprise CIOs? Be afraid. Be very afraid.
John Brandon |
12 Sep |
Read more
From implementing single sign-on to including social media in the lineup, shops are doing what they need to make the cloud work for them.
John Brandon |
01 Aug |
Read more
Criminal hackers never sleep, it seems. Just when you think you've battened down the hatches and fully safeguarded yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or an errant signal designed to jam GPS receivers.
John Brandon |
22 Nov |
Read more
Hackers never sleep, it seems. Just when you think you've battened down the hatches and fully protected yourself or your business from electronic security risks, along comes a new exploit to keep you up at night. It might be an SMS text message with a malevolent payload or a stalker who dogs your every step online. Or maybe it's an emerging technology like in-car Wi-Fi that suddenly creates a whole new attack vector.
John Brandon |
20 May |
Read more
The Titanic was thought to be unsinkable, a testament to the engineering prowess of its day and the fact that luxury liners rarely collided with massive icebergs.
John Brandon |
13 Oct |
Read more