Evan Schuman

Contributing Columnist

star Thought Leader IDG Contributor Network
Want to Join?
Opinions expressed by ICN authors are their own.

Evan Schuman has covered IT issues for a lot longer than he'll ever admit. The founding editor of retail technology site StorefrontBacktalk, he's been a columnist for CBSNews.com, RetailWeek, Computerworld and eWeek and his byline has appeared in titles ranging from BusinessWeek, VentureBeat and Fortune to The New York Times, USA Today, Reuters, The Philadelphia Inquirer, The Baltimore Sun, The Detroit News and The Atlanta Journal-Constitution. Evan can be reached at eschuman@thecontentfirm.com and he can be followed at twitter.com/eschuman. Look for his blog twice a week.

The opinions expressed in this blog are those of Evan Schuman and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Details of how the feds broke into iPhones should shake up enterprise IT

The case of the missing laptop RAM

The case of the missing laptop RAM

One of the best tech support programs in the industry has been Dell's ProSupport program, which routinely answers within 10 seconds and offers excellent techs who truly try to help. It also offers a next-day onsite repair program...

Text authentication is even worse than almost anyone thought

Text authentication is even worse than almost anyone thought

For years, security experts have been sounding the alarm about texting numbers for authentication. Now, due to some excellent work from Vice, it's clear the text situation is far worse than we thought.

WhatsApp's new 'privacy' policy is a gift to other messaging apps

WhatsApp's new 'privacy' policy is a gift to other messaging apps

WhatsApp does not treat all interaction data the same. For now, user-to-user/customer-to-customer/consumer-to-consumer messaging is encrypted and considered private. But when a user communicates with a business, Facebook can do...

Apple tramples on security in the name of convenience

Apple tramples on security in the name of convenience

Apple's upcoming iOS 14.5 and WatchOS 7.4 OSes will allow masked enterprise employees to access their iPhone if they happen to be wearing an Apple Watch that is unlocked. If companies don't stop workers from using this convenience, it...

Have a pacemaker and an iPhone? Could be a deadly combination

Have a pacemaker and an iPhone? Could be a deadly combination

Apple itself has issued a warning that its newest iPhone could attack your heart — literally.

When cryptographers looked at iOS and Android security, they weren’t happy

When cryptographers looked at iOS and Android security, they weren’t happy

In recent years, the feds have stopped asking for a workaround to get past Apple security. Why? It turns out that iOS, along with Android, is simply not as secure as those companies suggested.

SMS: Texting numeric strings is the best holiday gift to cyberthieves

SMS: Texting numeric strings is the best holiday gift to cyberthieves

Multi-Factor Authentication has become so common a security tool that many users assume it must work well to protect data and communications. What it really does is provide false comfort.

Apple's iPhone slowdown ploy was ridiculous, even by Apple standards

Apple's iPhone slowdown ploy was ridiculous, even by Apple standards

Now that Apple has agreed to pay $113 million to settle with iPhone users whose smartphone clockspeed was artificially slowed to boost hardware sales, it's worth examining why the move was so colossally stupid.

Should IT buy the new iPhone 12 Pro? Almost certainly not

Should IT buy the new iPhone 12 Pro? Almost certainly not

When it comes to whether enterprise IT should seriously consider this purchase — for those operations where BYOD hasn't yet alleviated the need to buy phones ever again — it doesn't make sense for most.

Zoom's new encryption approach is incremental, but better

Zoom's new encryption approach is incremental, but better

Max Krohn, Zoom's head of security engineering, detailed what users need to give up to get the better encryption protection that's coming.

How IT can use COVID-19 mobile crowdsourcing data to safeguard workers

How IT can use COVID-19 mobile crowdsourcing data to safeguard workers

Mobile apps galore have used crowdsourcing techniques this year to fight COVID-19. Now, a new app wants to build on those efforts by identifying communities (often down to the Zip Code) that are being aggressive or lenient in...

Load More