
IT roles are changing: how to avoid becoming obsolete due to digital disruption
The evolution of the technology driving digital disruption has the potential to make many IT…

Case Studies | Cloud Computing | Cyber Security | Information | Security | Technology | February 24, 2016
Five BYOD disasters organisations can avoid with good planning
The ‘bring-your-own-device’ (BYOD) approach to business technology has many advantages. If done correctly, it can…

Pirated iOS App Store’s Client Successfully Evaded Apple iOS Code Review
Apple’s official iOS App Store is well known for its strict code review of any…

New Android Trojan “Xbot” Phishes Credit Cards and Bank Accounts, Encrypts Devices for Ransom
We recently discovered 22 Android apps that belong to a new Trojan family we’re calling…