Europeans exhibit more caution regarding BYOD

BT conducted a survey of over 2000 IT users and decision makers across 11 countries. The research, released during last week’s Infosecurity Europe show in London, showed that Western European organizations tend to take a more guarded approach to BYOD i…

Read More >>

Want someone else’s Hotmail account?

A software bug can often lead to a vulnerability that can be exploited with sophisticated exploit code. Or sometimes you can just instal a free add-on that lets you do the same thing with no effort.

Read More >>