Microsoft is turning off basic authentication, so it’s wise to move mobile users to the Outlook app to better protect them from attackers.
As the global push toward 5G continues to pick up speed, government officials in the U.S. continue to have concerns about China's growing dominance in the 5G market. One U.S. senator, Sen. Mark Warner, has concerns about Chinese telecom companies pav...
Computerworld's Preston Gralla and Executive Editor Ken Mingis are back answering questions about Windows 10. If you have questions, post them in the comments to be featured in our next TECH(talk) about Windows 10.
Learn how to use the ac command. It reports on user login times, so if you’re interested in knowing how much time various users are spending on a Linux server, this command is a good choice.
Facebook plans to launch its cryptocurrency, Libra, next year despite intense scrutiny and regulatory hurdles. France and Germany are two of the latest countries to oppose Libra, saying they plan to block the use of Libra in their countries once Face...
Attackers are now enabling WDigest credential caching to allow them to harvest credentials. Here’s how to spot it.
While blockchain has been on a hype roll the last couple of years, it's become increasingly fragmented as more and more companies try out different flavors of the distributed ledger technology. What's that mean for future adoption? Computerworld's Lu...
Four large tech companies -- Apple, Amazon, Google and Facebook are under investigation in the U.S. for allegedly anticompetitive behavior. These antitrust investigations on both the federal and state levels are aimed at uncovering the practices thes...
Wireless charging technology has been around for over 100 years, but it has only recently found mainstream practical use for powering electronic devices like smartphones. Learn how this technology works and what advancements we may see in the future.
Learn how to use the sudo command. It’s a very important command for Linux security because it provides a way for individual users to run specific commands with the authority of root.
These are the security and compliance decisions you need to make when deploying Microsoft Teams.
As cryptocurrency becomes more mainstream and generates more buzz, it’s no surprise that the world’s most powerful tech companies are expressing interest in digital currency. Smartphones companies are set to offer cryptocurrency integration in di...
The California Consumer Privacy Act (CCPA) is, in some ways, similar to Europe's GDPR. This rule, which goes into effect in 2020, gives individual users more ownership over their own data. Users can even refuse to allow companies to sell their online...
Learn how to use the env command. The most useful thing it does is to provide information on your shell environment when you’re working on the Linux command line.
The FTC hit yet another tech company with a seemingly massive fine for mishandling user data. This time, YouTube, owned by Google, is forced to pay $170 million for collecting data about children under 13 without parental consent. The Federal Trade C...
Microsoft recommends setting up multi-factor authentication in Windows 10 for better security, but you have to disable basic or legacy authentication first.
No R package for an API you’d like to use? No problem! See how to write your own R code to pull data from an API using API key authentication.
In this Linux tip, learn how to use the touch command. It allows you to create an empty file or update a file’s last updated date/time settings.
Huawei’s soon-to-be released Mate 30 and Mate 30 Pro will not have access to Google’s Android operating system as we all know it. Google is prohibited from doing business with Huawei under the current ban, which means it can't offer support or up...
Phishing is a method of trying to gather personal information using deceptive e-mails and websites. Here's what you need to know about this increasingly sophisticated form of cyberattack.
With the new iPhone unveiling just weeks away, the rumor mill is in overdrive. What can you expect? We get the latest news and leaks from Macworld's Michael Simon, Computerworld's Ken Mingis and TECH(feed) host Juliet Beauchamp.
Rumors have begun swirling about what may be unveiled at Apple’s September event. We’ll probably see some updates on those services Apple rolled out earlier this year, as well as an update to the Apple Watch. And of course, Apple will announce it...
Nearly two dozen cities in Texas have been hit by a ransomware attack executed by a single threat actor. These attacks beg the question: Is it ever worth it to pay a cyber attacker’s ransom? In this episode of TECH(feed), Juliet discusses the patte...
Several new vulnerability disclosures in Windows Remote Desktop Protocol suggest it’s time to stop using it. Here’s how.
In May, the Commerce Department issued a reprieve on the Huawei ban that was set to expire this week. Just as President Trump expressed interest in cutting all ties with the Chinese company, the Commerce Department issued yet another 90-day delay on ...
Learn the wc command. It provides an easy way to count the lines, words and characters in a file or in output from some other command.
Computerworld’s Ken Mingis and Michael Simon from PCWorld and Macworld talk about how more mobile apps use artificial intelligence and how it improves features.
Computerworld’s Windows expert, Preston Gralla, and Executive Editor Ken Mingis answer questions about Windows 10 and discuss how the operating system is still evolving.
See how to use Git version control and sync with GitHub -- all right within RStudio
Learn how to use the groups command. It provides a list of the groups that a user is a member of by pulling information from the /etc/group and /etc/passwd files.
What's the best cloud platform for the enterprise?
Edge Chromium can provide more protection for organizations that use older versions of Windows.
Although the Huawei ban is no longer in full effect, U.S. companies still need a license to work with the Chinese tech company. And Huawei may be slowly preparing for life without U.S. vendor support by developing its own mobile operating system. In ...
Every year, thousands of hackers arrive in Las Vegas for three large security conferences -- DEF CON, Black Hat and Bsides Las Vegas -- taking place from Monday through Sunday next week. CSO Online's J.M. Porup chats with Juliet about what to expect ...
Just a few days after Equifax settled with the FTC over its 2017 data breach, Capital One announced it was the target of a March attack. Identifying information and bank account numbers are among some of the data breached in the attack that affects 1...
There are a number of ways attackers can exploit public information about your organization's employees. CSO Online's Susan Bradley walks through how an attacker can gain access to your organization's Office 365 accounts and how you can protect your ...
The Internet of things isn't all about self-driving cars or drone deliveries. IoT has plenty of practical use cases in urban and suburban settings alike. In this episode of TECH(talk), Network World's Jon Gold joins Juliet to discuss how IoT is makin...
As the push for sustainability across all businesses intensifies, so too will the push for greener IT infrastructure. Data centers are notorious for giving off thermal energy and being somewhat energy inefficient. Researchers at Rice University are l...
IPv6 is the latest version of the main communications method that identifies and locates computers and other devices on the internet. It provides more efficient packet handling, improving performance and security. Yet despite this, the rest of the in...
Apple is reportedly in talks to purchase Intel’s smartphone modem business -- and therefore all the intellectual property that comes with it. This move suggests Apple may eventually make its own 5G chips, but we’re likely still years away from th...
It's already been a big summer for Apple. At the annual WWDC conference in June, the company unveiled the long-awaited Mac Pro, along with a myriad of software updates. But recent news that Apple may buy Intel's smartphone modem business is just as i...
See how easy it is to make your own functions using ggplot2, dplyr, and other tidyverse package functions – without worrying about quoted and unquoted column names! Thanks to the latest version of the rlang package, tidy evaluation is now as easy a...
You have several options to set up alerts in Azure Active Directory to help spot risky user behavior.
The Trump administration levied tariff on many Chinese-made goods, including lots of tech hardware. Tech industry leaders have come out in opposition to the tariffs, which may result in higher prices. In this episode of TECH(feed), Juliet discusses h...
The dark web may sound ominous, but it’s really a catch-all term for the part of the internet that isn't indexed by search engines. Stay tuned for a guided tour of the web's less mainstream regions.
President Trump reversed his ban on all business transactions between the U.S. and Chinese tech giant Huawei a few weeks ago. Now, some U.S. companies will soon be able to sell their tech to Huawei once again--but not without jumping through a hoop o...
See how to use the special .SD symbol in the R data.table package.
Use these techniques to inventory your network to determine which devices have BitLocker.
In this Linux tip, learn how to use the setfacl and getfacl commands. They allow you to establish and report on file permissions that reach beyond the traditional read, write and execute permissions on Linux systems.
Last week, the Federal Trade Commission hit Facebook with a $5 billion fine for mishandling user data. The fine comes after the FTC’s investigation following the Cambridge Analytica scandal. On this episode of TECH(feed), Juliet discusses the impli...
Sponsored Links