Jen A. Miller

Jen A. Miller is a freelance journalist from New Jersey who writes for the New York Times, Philadelphia Inquirer and Runner's World, among others.

What are hackers up to these days?

What are hackers up to these days?

The short answer: They’re targeting sites in North America, where they’re planting malware in ad networks and launching dating site spam.

Can UC keep remote workers engaged?

Can UC keep remote workers engaged?

For something that seems so simple in theory, unified communications can be hard to pull off in practice. But it might be the only thing helping to keep your distributed workforce engaged.

4 tech nightmares keeping IT leaders up at night

4 tech nightmares keeping IT leaders up at night

What’s keeping CIOs awake at night? From data breaches to social engineering, there’s plenty to keep tech types tossing and turning.

Are IT executives blind to cybersecurity threats?

Are IT executives blind to cybersecurity threats?

If IT leaders and IT workers can’t agree that there’s a problem, what are the chances that they’ll actually implement the cybersecurity policy they need?

Has telecommuting finally become mainstream?

Has telecommuting finally become mainstream?

As the desire for workplace flexibility continues to be an accepted fact of contemporary working life, more and more businesses are wrestling with how exactly to embrace – or curtail – telecommuting as the new normal.

People are (still) the biggest security risks

People are (still) the biggest security risks

Social engineering and ‘download this attachment’ scams are back – as if they ever left – and working better than ever, unfortunately.

Fitness apps moving up to the big leagues

Fitness apps moving up to the big leagues

If you use a free app to map your run, track your biking or monitor your fitness activity, most likely you're now feeding that data right into a fitness company that wants to sell you something.

How to avoid common travel and vacation scams

How to avoid common travel and vacation scams

From social engineering before you even get on the plane to apps that are riddled with security holes, it’s never been easier for cybercriminals to target unsuspecting travelers.

How long does it take to build a custom app?

How long does it take to build a custom app?

Thanks to advances in app-building technology and a changing mindset, the answer may surprise you.

Should CIOs worry about the Internet of Hackable Things?

Should CIOs worry about the Internet of Hackable Things?

From wearables to appliances to e-readers, there’s no shortage of possible security holes when almost every device is connected. What’s a CIO to do?

How to measure the success of enterprise mobile apps

How to measure the success of enterprise mobile apps

If you’re not testing the performance of the mobile apps your company is deploying, you may be driving your employees into the shadows.

The real cost of unused software will shock you

The real cost of unused software will shock you

A new study shows that, on average, each computer in every office around the world has about $259 of unnecessary, unwanted or unused software on it. That’s a lot of shelfware – and it’s costing companies big-time.

How secure are wearables, anyway?

How secure are wearables, anyway?

Whether you're using that new wearable for yourself or managing IT at a company where fit trackers and smart watches are becoming more popular, wearables just might be the next big bullseye for cybercriminals.

Where do mobile apps fit in the world of enterprise software?

Where do mobile apps fit in the world of enterprise software?

While a recent study turns the idea of a ‘blockbuster’ app on its head, there’s no doubt that enterprise companies are embracing apps – especially mobility apps – in a big way.

How fake users are impacting business … and your wallet

How fake users are impacting business … and your wallet

Those fraudulent charges most of us have (hopefully) seen and corrected on our credit or debit cards are costing everyone a lot of money.

The year in fraud: 2015 in 13 numbers

The year in fraud: 2015 in 13 numbers

It's that time of year: Round ups, hot takes and eulogies for the year abound. We're no different, but we're going to tell the story of 2015 a little differently – through numbers. Thirteen of them to be exact. In no particular order,...

Are fake online reviews crushing consumer confidence?

Are fake online reviews crushing consumer confidence?

While a certain percentage of them are almost certainly suspect, customer-driven online ratings and reviews are just too powerful to simply ignore. But does anyone really trust them?

Welcome to the Internet of stupid (hackable) things

Welcome to the Internet of stupid (hackable) things

The rise of IoT technology brings with it the promise of innovation the likes of which we’ve never seen. But the reality of everything being connected can have unintended consequences, not all of them useful.

How to recognize an online fraudster

How to recognize an online fraudster

The capability to profile potential cybercriminals, along with the implementation of chip-and-pin credit cards, may produce a reduction in the amount of money lost to online fraud each year. But that doesn’t mean the threat will go...

Malvertising – the new silent killer?

Malvertising – the new silent killer?

Malicious ads on the websites you visit aren’t a new phenomenon. The fact that they now avoid detection and don’t need you to click on ‘em to infect your computer is new, and increasingly troublesome.

Load More