Microsoft’s Lightweight Windows Phone App Builder Saw 30,000 Projects Started In First 48 Hours

Today on the Windows Developer Show, on which I was a guest, Microsoft’s Bryan Tomlinson announced that the new Windows Phone App Studio had seen usage higher than the company anticipated
First Lavabit, now Silent Circle: Another U.S. secure email service closes to protect users

Silent Circle, the provider of a range of secure communications services, has pre-emptively closed its Silent Mail email service in order to stop U.S. authorities from spying on its customers.
Data breach numbers don’t lie: How organizations can protect against accidental data loss

This summer we’ve seen a number of high profile data breaches, from the IRS leaking 100,000 Social Security numbers to Japan’s government accidentally sharing internal emails with the public through Google Groups.
Can Your Employees Efficiently & Securely Transfer Large Files?

If employees are using regular email software and methods of attachments to send sensitive data and client information or transfer large files, an ad hoc file transfer solution can tighten up security
Cybersecurity and the board: avoiding personal liability — Part III of III: Policies and procedures

In the previous two installments of this series, we discussed the fiduciary obligation of officers/directors to proactively address cyber security and the legal basis for holding them personally liable if they fail to do so.
Gap between Google Play and AV vendors on adware classification

Call it insult to injury: Android users are used to being frequent malware targets, but they have other security issues to consider as well.
Cyber Hackers on Course for One Million Malware Apps

Google’s Android mobile operating system is so besieged by cyber hackers’ malicious apps that the malware count is on track to hit the million mark by 2014, a new report from cyber analysts Trend Micro warns.
Cars may need Anti-Malware protection as well…

The Center for Automotive Embedded Systems Security (CAESS) conducted a study showing what could happen if a determined hacker went after the computer systems embedded in cars.
Twitter finally gets tougher on death and rape threats

It’s been an exceedingly ugly fortnight on Twitter. Following a successful campaign orchestrated by journalist and feminist Caroline Criado-Perez to have a woman reinstated on Bank of England banknotes
Will Smith makes unexpected appearance at Defcon hacker conference

Actor Will Smith captured the attention of Defcon attendees when he showed up unexpectedly at the hacker conference on Sunday apparently to do research for an upcoming movie.