John Brandon

star Thought Leader IDG Contributor Network
Want to Join?
Opinions expressed by ICN authors are their own.

John Brandon is a technologist, product tester, car enthusiast and professional writer. Before becoming a writer, he worked in the corporate sector for 10 years. He has published over 8,500 articles, many of them for Computerworld, TechHive, Macworld and other IDG entities.

The opinions expressed in this blog are those of John Brandon and do not necessarily represent those of IDG Communications, Inc., its parent, subsidiary or affiliated companies.

What life after the smartphone will look like

How to deal with the bot crisis on Twitter

How to deal with the bot crisis on Twitter

You may have run into these bots a few times. What looks like an actual human being could have been a bot sending you Twitter spam...or even worse. One of the most nefarious examples is when Twitter bots are used to inflate traffic to...

Hoe een cyberoorlog uitbreekt tussen AI-bots

Criminele aanvallers zetten kunstmatige intelligentie in, net als de verdedigers.

How AI is stopping criminal hacking in real time

How AI is stopping criminal hacking in real time

Almost every day, there’s news about a massive data leak -- a breach at Yahoo that reveals millions of user accounts, a compromise involving Gmail phishing scams. Security professionals are constantly moving the chess pieces around,...

Mark Zuckerberg als President? Liever niet!

Op sommige vlakken kan hij zich al president noemen

What the rise of social media hacking means for your business

What the rise of social media hacking means for your business

While it might be easy to dismiss sites like Facebook, Twitter, and LinkedIn as harmless diversions for employees, they reveal a wealth of actionable intel to a hacker.

How secure are home robots?

How secure are home robots?

They have blinking lights and tend to chirp constantly. One of them can vacuum your living room carpet on a schedule. Another can play games with the kids using artificial intelligence. Yet, for homeowners (and security professionals)...

Security for your collaborative software

Security for your collaborative software

There’s a gaping hole in your security infrastructure right now. The front door is open, the side window is ajar, and there’s an open safe with a neon sign saying “steal my data” in flashing lights.

What this expensive ‘secure’ phone tells us about mobile hacking

What this expensive ‘secure’ phone tells us about mobile hacking

Mobile security is a bit of a misnomer. Few of us can say we’ve been attacked by a piece of malware or have quarantined an actual virus. Yet, there’s a sneaking suspicion that mobile security is a bigger concern.

4 laptop beveiligingstrends die je moet kennen

Het aantrekkelijkste apparaat voor hackers moet je goed beveiligen.

4 laptop security trends you should know about

4 laptop security trends you should know about

These new techniques and products are not as widely known, yet they are effective for any laptop-carrying business worker who needs to fend off the latest attacks.

Why a Verizon and Yahoo merger would be like Microsoft snapping up CompuServe

Why a Verizon and Yahoo merger would be like Microsoft snapping up CompuServe

Cultures collide, it happens. But this one is a bad idea.

Load More