Evan Schuman

Contributing Columnist

star Thought Leader IDG Contributor Network
Want to Join?
Opinions expressed by ICN authors are their own.

Evan Schuman has covered IT issues for a lot longer than he'll ever admit. The founding editor of retail technology site StorefrontBacktalk, he's been a columnist for CBSNews.com, RetailWeek, Computerworld and eWeek and his byline has appeared in titles ranging from BusinessWeek, VentureBeat and Fortune to The New York Times, USA Today, Reuters, The Philadelphia Inquirer, The Baltimore Sun, The Detroit News and The Atlanta Journal-Constitution. Evan can be reached at eschuman@thecontentfirm.com and he can be followed at twitter.com/eschuman. Look for his blog twice a week.

The opinions expressed in this blog are those of Evan Schuman and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

Apple's anti-porn overreach — good intent, bad execution

This Vultur app takes malicious to the next level

This Vultur app takes malicious to the next level

As if IT needs more reminders that apps in app stores may not be secure, a Netherlands security firm has found a new Android dropper app dubbed Vultur. It offers, and delivers, legitimate functionality, then shifts into malicious mode...

It's time, IT — set the rules of the road for mobile

It's time, IT — set the rules of the road for mobile

When it comes to keeping everyone in the company on the same page, IT could be doing more. That's especially true when making sure mobile devices are secured.

About the Pegasus spyware, Apple's telling the full truth

About the Pegasus spyware, Apple's telling the full truth

When spyware from an Israeli firm was discovered on a number of iPhones used by journalists, critics hit Apple over security and privacy concerns. But in this case, it doesn't look like the company did anything wrong.

Note to IT: Google really wants its privacy settings left alone

Note to IT: Google really wants its privacy settings left alone

It's deeply unsurprising that newly-released information from the Attorney General's office for Arizona — released when a judge agreed to unseal some of the data — shows Google trying to hide privacy settings and tracking users after...

When is a cybersecurity hole not a hole? Never

When is a cybersecurity hole not a hole? Never

In cybersecurity, one of the challenging issues is figuring out when a security hole is a big deal or is trivial. Apple now has a hole that pushes the definition.

Google makes a big security change, but other companies must follow

Google makes a big security change, but other companies must follow

Google is moving — slowly — to make multi-factor authentication default, pushing FIDO-compliant software embedded within the phone, and even has an iOS version. Nice touch.

Google and Apple claim their devices deliver a better sleep; not true, university says

Google and Apple claim their devices deliver a better sleep; not true, university says

A university study found that a frequently-heralded smartphone claim by both companies is non-existent. This raises a serious question: Don’t they have to prove something works before shouting it from the highest virtual rooftop?...

Rethinking mobile security in a post-COVID workplace

Rethinking mobile security in a post-COVID workplace

Remember all of the security corner-cutting forced on us in March 2020 as companies scrambled to deal with the pandemic? It's time now to go back and fix things.

Details of how the feds broke into iPhones should shake up enterprise IT

Details of how the feds broke into iPhones should shake up enterprise IT

Given that law enforcement can leverage a hole in Mozilla open-source code that Apple used to permit accessories to be plugged into an iPhone’s lightning port, IT and enterprise security pros need to view mobile device security...

The case of the missing laptop RAM

The case of the missing laptop RAM

One of the best tech support programs in the industry has been Dell's ProSupport program, which routinely answers within 10 seconds and offers excellent techs who truly try to help. It also offers a next-day onsite repair program...

Text authentication is even worse than almost anyone thought

Text authentication is even worse than almost anyone thought

For years, security experts have been sounding the alarm about texting numbers for authentication. Now, due to some excellent work from Vice, it's clear the text situation is far worse than we thought.

Load More