Gartner’s dark vision for tech, jobs

Science fiction writers have long told of great upheaval as machines replace people. Now, so is research firm Gartner. The difference is that Gartner
Security Ratings Proliferate As Firms Seek Better Intel

Wondering if that mobile app is safe? There’s a score for that. If that business partner takes security seriously? There’s a score for that too.
Application developer talent: Time to play moneyball

Michael Rosenbaum, founder and CEO of Catalyst IT Services, thinks software development could be quantified in a way akin to the moneyball tactics in baseball.
Spies launch hack attacks on Mongolia… to see who its friends are

Cyber-spies are targeting Mongolian businesses and government agencies to keep the attackers “aware” of the land-locked country’s relationships with “Western influences” like the US and the European Union, according to a recent report.
Facebook makes every user discoverable by name

Once again, Facebook is doing away with a feature that many users didn’t even know they could use, but a small, privacy-conscious minority is glad to have (had).
WhatsApp flaw could allow attackers to decrypt messages

The popular mobile messaging application WhatsApp Messenger has a major design flaw in its cryptographic implementation that could allow attackers to decrypt intercepted messages, according to a Dutch developer.
Google Apps in a third of UK colleges and universities

Google has revealed a third of UK colleges and universities are using Google Apps for Education.
Disney develops ‘feel-around’ touchscreens

The Disney Co. on Wednesday announced a new touch-screen technology that offers users tactile sensations that mimic real surfaces.
Video: Weaponizing your coffee pot

As SoC price continue to drop and their implementation continues to rise, connected appliances (Internet of Things) will be become an attractive avenue for cyber criminals.
Smart card readers for the iPhone and iPad

BYOD becomes a bit more complicated when you work in an environment that requires stronger forms of authentication than a username and password combination.