John Brandon

star Thought Leader IDG Contributor Network
Want to Join?
Opinions expressed by ICN authors are their own.

John Brandon is a technologist, product tester, car enthusiast and professional writer. Before becoming a writer, he worked in the corporate sector for 10 years. He has published over 8,500 articles, many of them for Computerworld, TechHive, Macworld and other IDG entities.

The opinions expressed in this blog are those of John Brandon and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

What life after the smartphone will look like

How to deal with the bot crisis on Twitter

How to deal with the bot crisis on Twitter

You may have run into these bots a few times. What looks like an actual human being could have been a bot sending you Twitter spam...or even worse. One of the most nefarious examples is when Twitter bots are used to inflate traffic to...

How AI is stopping criminal hacking in real time

How AI is stopping criminal hacking in real time

Almost every day, there’s news about a massive data leak -- a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around,...

What the rise of social media hacking means for your business

What the rise of social media hacking means for your business

While it might be easy to dismiss sites like Facebook, Twitter, and LinkedIn as harmless diversions for employees, they reveal a wealth of actionable intel to a hacker.

How secure are home robots?

How secure are home robots?

They have blinking lights and tend to chirp constantly. One of them can vacuum your living room carpet on a schedule. Another can play games with the kids using artificial intelligence. Yet, for homeowners (and security professionals)...

Security for your collaborative software

Security for your collaborative software

There’s a gaping hole in your security infrastructure right now. The front door is open, the side window is ajar, and there’s an open safe with a neon sign saying “steal my data” in flashing lights.

What this expensive ‘secure’ phone tells us about mobile hacking

What this expensive ‘secure’ phone tells us about mobile hacking

Mobile security is a bit of a misnomer. Few of us can say we’ve been attacked by a piece of malware or have quarantined an actual virus. Yet, there’s a sneaking suspicion that mobile security is a bigger concern.

4 laptop security trends you should know about

4 laptop security trends you should know about

These new techniques and products are not as widely known, yet they are effective for any laptop-carrying business worker who needs to fend off the latest attacks.

Why a Verizon and Yahoo merger would be like Microsoft snapping up CompuServe

Why a Verizon and Yahoo merger would be like Microsoft snapping up CompuServe

Cultures collide, it happens. But this one is a bad idea.

10 travel apps to smooth your next business trip

10 travel apps to smooth your next business trip

The best-laid plans of mice and business travelers often go awry. When trip stress is mounting, these mobile apps can help.

Is your car secure? Maybe not, but enterprise users can still learn something

Is your car secure? Maybe not, but enterprise users can still learn something

If you're looking for a good lesson in enterprise security, there might be a few sitting in the parking lot. The automotive field is a glaring example of "worst practices" in security, say several automotive experts. And, the problem...

How computer modeling built the 2016 Cadillac CT6

How computer modeling built the 2016 Cadillac CT6

To keep costs low and hit production schedules, Cadillac engineers ran more than 200,000 simulations and spent 50 million compute hours testing the new car. Here’s what they learned.

Load More