John Brandon

star Thought Leader IDG Contributor Network
Want to Join?
Opinions expressed by ICN authors are their own.

John Brandon is a technologist, product tester, car enthusiast and professional writer. Before becoming a writer, he worked in the corporate sector for 10 years. He has published over 8,500 articles, many of them for Computerworld, TechHive, Macworld and other IDG entities.

The opinions expressed in this blog are those of John Brandon and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

How to deal with the bot crisis on Twitter

How AI is stopping criminal hacking in real time

How AI is stopping criminal hacking in real time

Almost every day, there’s news about a massive data leak -- a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around,...

Why companies offer a hacking bounty

Why companies offer a hacking bounty

Want to make a cool $20,000? All you have to do is hack the Nintendo 3DS, a handheld console that’s been out for a few years already. A listing on HackerOne spells everything out. There’s a range for this, of course -- some...

What the rise of social media hacking means for your business

What the rise of social media hacking means for your business

While it might be easy to dismiss sites like Facebook, Twitter, and LinkedIn as harmless diversions for employees, they reveal a wealth of actionable intel to a hacker.

How secure are home robots?

How secure are home robots?

They have blinking lights and tend to chirp constantly. One of them can vacuum your living room carpet on a schedule. Another can play games with the kids using artificial intelligence. Yet, for homeowners (and security professionals)...

Security for your collaborative software

Security for your collaborative software

There’s a gaping hole in your security infrastructure right now. The front door is open, the side window is ajar, and there’s an open safe with a neon sign saying “steal my data” in flashing lights.

What this expensive ‘secure’ phone tells us about mobile hacking

Mobile security is a bit of a misnomer. Few of us can say we’ve been attacked by a piece of malware or have quarantined an actual virus. Yet, there’s a sneaking suspicion that mobile security is a bigger concern.

4 laptop security trends you should know about

4 laptop security trends you should know about

These new techniques and products are not as widely known, yet they are effective for any laptop-carrying business worker who needs to fend off the latest attacks.

Why a Verizon and Yahoo merger would be like Microsoft snapping up CompuServe

Why a Verizon and Yahoo merger would be like Microsoft snapping up CompuServe

Cultures collide, it happens. But this one is a bad idea.

Is your car secure? Maybe not, but enterprise users can still learn something

Is your car secure? Maybe not, but enterprise users can still learn something

If you're looking for a good lesson in enterprise security, there might be a few sitting in the parking lot. The automotive field is a glaring example of "worst practices" in security, say several automotive experts. And, the problem...

How computer modeling built the 2016 Cadillac CT6

How computer modeling built the 2016 Cadillac CT6

To keep costs low and hit production schedules, Cadillac engineers ran more than 200,000 simulations and spent 50 million compute hours testing the new car. Here’s what they learned.

Security concerns rising for Internet of Things devices

The burgeoning market for gadgets that trigger a sprinkler system, help you count the number of times you swing a bat, or dim the lights automatically are rising. That’s a concern for any business due to how these devices are also...

Load More