Mac-in-Business
  1. Security
    May 15th, 2015 by Glenn Fleishman
    When security products don’t actually make you safer

    I hate to poke holes in good faith efforts to improve the integrity and security of individuals’ and businesses’ data, but, in just the last week, I’ve seen three separate efforts...

  2. Security
    April 28th, 2015 by Lucian Constantin
    Second HTTPS snooping flaw breaks security for thousands of iOS apps

    Attackers can potentially snoop on the encrypted traffic of over 25,000 iOS applications due to a vulnerability in a popular open-source networking library. The vulnerability stems...

  3. Security
    April 23rd, 2015 by Anthony Caruana
    1500 flawed iOS apps in App Store

    Researchers from security firm SourceDNA have found 1500 apps in the App Store that suffer from an SSL validation issue discovered in an open source library. Although the library was...

  4. Security
    April 21st, 2015 by Anthony Caruana
    Dead apps an enterprise risk

    It happens to all of us – there’s an app you like but after some time the developer either abandons the app or they stop updating it, having replaced it with something new. Evernote...

  5. Security
    April 20th, 2015 by Anthony Caruana
    Macs still vulnerable to “Rootpipe”

    Late in 2014, a security flaw, dubbed “Rootpipe”, was identified. This gives root access to attackers. Root access gives greater access to low level processes and files that are...

  6. Security
    April 20th, 2015 by Anthony Caruana
    iOS users more easily phished than Android

    According to a report by security firm ThreatSim, about 8% of clicks on phishing emails come from iOS with just 2% coming from Android. The research went further, finding 16% of iOS...

  7. Security
    March 24th, 2015 by Mike Elgan
    The business behind Apple’s gigantic Apple Watch rollout

    The Apple Watch may or may not be an impressive piece of design or technology. But one thing is certain: Apple’s preparations for retail sales of the watch are amazing. Let’s...

  8. Security
    March 20th, 2015 by Michael Cooney
    IBM: Mobile app security environment currently vulnerable

    Major weaknesses in mobile application development make enterprise data vulnerable to attack. That was the major conclusion from an IBM/Ponemon study released last week which found...

  9. Security
    March 16th, 2015 by Jeremy Kirk
    Google error leaks owner personal info for nearly 300,000 websites

    A Google software problem inadvertently exposed the names, addresses, email addresses and phone numbers used to register websites after people had chosen to keep the information private....

  10. Security
    March 13th, 2015 by Macworld Australia Staff
    Parallels webinar: Find out how to maximise the Macs in a Windows environment

    Did you miss the Parallels webinar on 27 February? Now’s your chance to find out the latest on practical solutions for controlling and managing the Macs in your business. The webinar...

  11. Security
    February 6th, 2015 by Maria Korolov
    New iOS spy app listens in to conversations

    A new front has opened up in the Operation Pawn Storm cyber-espionage operation – an iOS app that spies on users, up to and including secretly turning on the phone’s microphone...

  12. Security
    December 16th, 2014 by Anthony Caruana
    Protecting your tech during the holidays

    Your business relies on technology. Whether it’s for the accounts program, point of sale system or just email and scheduling, losing your computer or a server can spell big trouble...

  13. Security
    November 22nd, 2014 by Anthony Caruana
    Data security pitfalls – Five things you need to know

    Over the last couple of years, the IT security landscape has changed in some very significant ways. Criminal gangs and nation states are now responsible for many security breaches and...

  14. Security
    November 17th, 2014 by Mikael Ricknas
    How Apple, Samsung and BlackBerry are fighting to win the enterprise

    Samsung Electronics’ deal with BlackBerry and Apple’s efforts to make it easier to configure and deploy massive numbers of iPhones highlight how the smartphone makers are...

  15. Security
    November 1st, 2014 by Anthony Caruana
    Getting ready for Apple Pay

    Apple Pay was announced at the recent Apple event as one of the new features that takes advantage of the NFC capability and security features built into the new iPhone 6 and iPhone...

  16. Security
    October 20th, 2014 by Anthony Caruana
    Five tips to make internet banking safer

    Visiting the bank for everyday tasks such as withdrawing cash, making deposits and paying bills is a relic of the past. Online payments are common and we can easily manage several bank...

  17. Security
    October 17th, 2014 by Bill Snyder
    McDonald’s CIO on why it’s supporting Apple Pay on launch day

    Deborah Hall-Lefevre is making the biggest bet of her 23-year IT career. Overnight Hall-Lefevre, McDonald’s vice president and CIO of US Information Technology, is going to flip...

Contact us