<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:media="http://search.yahoo.com/mrss/"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Computerworld &#8211; Pagegoo</title>
	<atom:link href="https://pagegoo.com/author/computerworld/feed/" rel="self" type="application/rss+xml" />
	<link>https://pagegoo.com</link>
	<description>Pagegoo News</description>
	<lastBuildDate>Wed, 03 Dec 2025 10:17:47 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://pagegoo.com/wp-content/uploads/2024/12/cropped-sq500-32x32.png</url>
	<title>Computerworld &#8211; Pagegoo</title>
	<link>https://pagegoo.com</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>22 pro Android security settings you shouldn’t overlook – Computerworld</title>
		<link>https://pagegoo.com/2025/12/22-pro-android-security-settings-you-shouldnt-overlook-computerworld/</link>
		
		<dc:creator><![CDATA[Computerworld]]></dc:creator>
		<pubDate>Wed, 03 Dec 2025 10:17:47 +0000</pubDate>
				<category><![CDATA[TECHNOLOGY]]></category>
		<guid isPermaLink="false">https://62.146.175.13/2025/12/22-pro-android-security-settings-you-shouldnt-overlook-computerworld/</guid>

					<description><![CDATA[Anything that takes you to another area of the operating system will still require authentication, of course, but the simple on-off tiles can be tapped and toggled by anyone who’s holding the phone. More often than not, that’s an added convenience. Say you want to flip on your phone’s Bluetooth for a fast connection, for [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><br />
</p>
<div>
<p>Anything that takes you to another area of the operating system will still require authentication, of course, but the simple on-off tiles can be tapped and toggled by anyone who’s holding the phone.</p>
<p>More often than not, that’s an added convenience. Say you want to flip on your phone’s Bluetooth for a fast connection, for instance, or flash on your flashlight to find that stray cheesy poof that slipped out of your sticky grabbers and fell onto the floor. Being able to do those things with a couple quick taps and without having to unlock your phone can certainly be handy.</p>
<p>At the same time, though, it can also allow someone <em>else </em>to do something like change your phone’s sound settings, disable its Wi-Fi connection, or even put it into airplane mode. And if you’re really aiming for the tightest security available, you probably don’t want that sort of stuff to be possible.</p>
<p>Here’s the good news: If you’ve got a device with a reasonably recent Android version, you can take control and turn at least <em>some</em> of those controls off in the lock screen environment. With Android 12 and up, march into the Display section of your Android settings and tap “Lock screen.” Turn the toggle next to the “Use device controls” option into the off position, then make a celebratory squawking sound and get yourself a soda.</p>
<p>With Samsung phones, you’ll instead need to head into the Lock Screen section of your settings and tap the line labeled “Secure lock settings.” There, you’ll find an option to “Lock network and security,” which prevents any network-related toggles from being used in that context.</p>
<h2 class="wp-block-heading" id="android-security-setting-9-nfc-protection">Android security setting #9: NFC protection</h2>
<p>While we’re thinking about your lock screen, take two seconds to secure any digital transfer mechanisms connected to your phone and make sure they’re available only when your device is unlocked.</p>
<p>It’s one of the most obvious-seeming Android settings, and yet, if you don’t actively enable it, it won’t be present — and everything from credit cards to locally stored data could be significantly more susceptible to theft as a result.</p>
<p>This option’s present only in Google’s core Android software and <em>not</em>, unfortunately, in Samsung’s heavily modified implementation of the operating system.</p>
<p>If you’ve got a Pixel or another phone that’s using a more unadulterated Android setup, though, search your system settings for <strong>NFC</strong> and look for the line labeled “Require device unlock for NFC.” Flip the toggle next to it into the on position, then rest easy knowing no manner of wireless transfer can occur when your device is locked.</p>
<h2 class="wp-block-heading" id="android-security-setting-10-extend-unlock">Android security setting #10: Extend Unlock</h2>
<p>Security is only useful if you actually use it — and given the extra level of inconvenience it often adds into our lives, it’s all too easy to let our guards down and get lazy after a while.</p>
<p>Android’s <a href="https://www.computerworld.com/article/1709343/google-smart-lock-complete-guide.html">Extend Unlock feature</a> (known as Smart Lock until Google recently renamed it to drive us all completely batty) is designed to counteract that tendency by making security a teensy bit less annoying. It can let you automatically keep your phone unlocked whenever you’re in a trusted place — like your home, your office, or that weird-smelling restaurant where you eat barbeque sandwiches almost disgustingly often — or even when you’re connected to a trusted Bluetooth device, like a smartwatch, some earbuds, or your car’s audio system.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-large large"><img loading="lazy" decoding="async" src="https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-extend-unlock.jpg?quality=50&amp;strip=all&amp;w=1024" alt="Android security settings: Extend Unlock" class="wp-image-3550596" srcset="https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-extend-unlock.jpg?quality=50&amp;strip=all 2160w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-extend-unlock.jpg?resize=300%2C137&amp;quality=50&amp;strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-extend-unlock.jpg?resize=768%2C350&amp;quality=50&amp;strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-extend-unlock.jpg?resize=1024%2C467&amp;quality=50&amp;strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-extend-unlock.jpg?resize=1536%2C700&amp;quality=50&amp;strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-extend-unlock.jpg?resize=2048%2C934&amp;quality=50&amp;strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-extend-unlock.jpg?resize=1240%2C565&amp;quality=50&amp;strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-extend-unlock.jpg?resize=150%2C68&amp;quality=50&amp;strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-extend-unlock.jpg?resize=854%2C389&amp;quality=50&amp;strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-extend-unlock.jpg?resize=640%2C292&amp;quality=50&amp;strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-extend-unlock.jpg?resize=444%2C202&amp;quality=50&amp;strip=all 444w" width="1024" height="467" sizes="auto, (max-width: 1024px) 100vw, 1024px"/><figcaption class="wp-element-caption">Extend Unlock — or Smart Unlock, if you prefer — is a powerful way to balance security with convenience.</figcaption></figure>
<p class="imageCredit">JR Raphael, IDG</p>
</div>
<p>The exact placement of this system can vary considerably, so the simplest thing to do is to search your system settings for the word <strong>extend</strong> to find it and explore all the available possibilities.</p>
<p>And if you ever find the Trusted Places part of <s>Smart Lock</s> Extend Unlock isn’t working reliably, by the way, <a href="https://www.computerworld.com/article/1682570/android-smart-lock-trusted-places.html">here’s the 60-second fix</a>.</p>
<h2 class="wp-block-heading" id="android-security-setting-11-two-factor-authentication">Android security setting #11: Two-factor authentication</h2>
<p>This next one’s technically a <a href="https://www.computerworld.com/article/1615305/10-steps-to-smarter-google-account-security.html">Google <em>account </em>security</a> option and not specific to Android, but it’s very much connected to Android and your overall smartphone experience.</p>
<p>You know <a href="https://www.csoonline.com/article/3239144/2fa-explained-how-to-enable-it-and-how-it-works.html" target="_blank">what two-factor authentication is</a> by now, right? And you’re using it everywhere you can — <em>especially </em>on your Google account, which is probably associated with all sorts of sensitive data? RIGHT?!</p>
<p>If you aren’t, by golly, now’s the time to start. Hustle over to <a href="https://myaccount.google.com/signinoptions/twosv" target="_blank" rel="noreferrer noopener">this official Google 2FA settings page</a> and follow the steps to set things up.</p>
<p>For most people, I’d recommend using your phone’s own “Security Key” option as the default method, if it’s available, followed by “Google prompts” and an authenticator app as secondary methods. For that last part, you’ll need to download and set up an app like Google’s own<a href="https://play.google.com/store/apps/details?id=com.google.android.apps.authenticator2" rel="noopener nofollow" target="_blank"> Authenticator</a> or the more flexible <a href="https://play.google.com/store/apps/details?id=com.authy.authy" rel="noopener nofollow" target="_blank">Authy</a> to generate your sign-in codes.</p>
<p>If you really want to take your Google account security to the max, you can also go a step further and set up a <a href="https://www.computerworld.com/article/1624876/google-passkeys-android-security.html">Google passkey on your phone</a> for even stronger security — or purchase a <a href="https://www.pcmag.com/picks/the-best-security-keys-for-multi-factor-authentication" rel="noopener nofollow" target="_blank">specific standalone hardware key</a> that’ll control the process and be required for any successful sign-in to occur.</p>
<p>It’ll add an extra step into your sign-in sequence, but this is one area where the minor inconvenience is very much worth the tradeoff for enhanced protection.</p>
<h2 class="wp-block-heading" id="android-security-setting-12-identity-check">Android security setting #12: Identity Check</h2>
<p>Aside from all the steps we’ve taken to safeguard initial access to your device, a relatively recent Android security addition can create an extra layer of protection in front of your phone’s most sensitive system settings.</p>
<p>It’s called Identity Check, and it’s a simple toggle that requires additional biometric authentication before accessing areas like passwords and your primary device password or PIN. It’ll only ask for that extra authentication if you aren’t in a known, trusted location. There’s really no reason <em>not</em> to enable it.</p>
<p>So search your system settings for <strong>Identity Check</strong>, tap the associated option, and flip its toggle into the on and active position. It’s another small piece of a sprawling security puzzle, and all of these little pieces absolutely do add up.</p>
<h2 class="wp-block-heading" id="android-security-setting-13-lockdown-mode">Android security setting #13: Lockdown mode</h2>
<p>Provided you’re using a phone with Android 9 or higher (and if you aren’t, switching over to a current phone that actually gets active software updates should be your top security priority!), an Android setting called <a href="https://www.computerworld.com/article/1699002/android-pie-security-setting.html">lockdown mode</a> is well worth your while to investigate. Once enabled, it gives you an easy way to temporarily lock down your phone from all biometric and Extend Unlock security options — meaning only a pattern, PIN, or password can get a person past your lock screen and into your device.</p>
<p>The idea is that if you were ever in a situation where you thought you might be forced to unlock your phone with your fingerprint or face — be it by some sort of law enforcement agent or just by a regular ol’ hooligan — you could activate the lockdown mode and know your data couldn’t be accessed without your explicit permission. No notifications will ever show up on your lock screen while the mode is active, and that heightened level of protection will remain in place until you manually unlock your phone (even if the device is restarted).</p>
<p>The trick, though, is that on certain phones — including most Samsung Android devices — you have to enable the option ahead of time in order for it to be available. To confirm that it’s activated on your device, open up your Android settings, search for the word <strong>lockdown</strong>, and make sure the toggle alongside “Show lockdown option” is set to the on position.</p>
<p>If you’re using a current phone and <em>don’t </em>see any results for that search, the option is probably just automatically enabled — and you shouldn’t have to do anything to make it available.</p>
<p>Either way, once the system’s up and running, you should see a command labeled either “Lockdown” or “Lockdown mode” within the standard system power menu — the thing that pops up whenever you press and hold your phone’s power button (or press and hold the power button and volume-up button together, on certain devices).</p>
<p>With any luck, you’ll never need it. But it’s a good added layer of protection to have available, just in case — and now you know how to find it.</p>
<h2 class="wp-block-heading" id="android-security-setting-14-app-pinning">Android security setting #14: App pinning</h2>
<p>One of Android’s most practical settings is also one of its most hidden. I’m talkin’ about app pinning — something introduced way back in 2014’s Lollipop era and rarely mentioned since.</p>
<p>App pinning makes it possible for you to lock a single app or process to your phone and then require a password or fingerprint authentication before anything else can be accessed. It can be invaluable when you pass your phone off to a friend or colleague and want to be sure they don’t accidentally (or maybe not so accidentally) get into something they shouldn’t.</p>
<p>To use app pinning, you’ll first need to activate it by opening that trusty ol’ Security &amp; Privacy section in your Android settings and then finding the line labeled “App pinning,” “Screen pinning,” or possibly “Pin app” or “Pin windows.” (You’ll probably have to tap a line labeled “Advanced settings,” “More security settings,” “More security &amp; privacy,” or “Other security settings” to reveal it.) Tap those words, whatever they are on your specific device, then turn the feature on (via either the “App pinning” or “Allow apps to be pinned” option) and also make sure the toggle to require authentication before unpinning is activated within that same area.</p>
<p>Then, the next time you’re about to place your phone in someone else’s grubby grabbers, first open up your system Overview interface — either by swiping up from the bottom of your screen and holding your finger down, if you’re using <a href="https://www.computerworld.com/article/1658581/android-gestures.html">Android’s gesture system</a>, or by pressing the square-shaped button, if you’re still hangin’ onto the old-school three-button nav setup.</p>
<p>On any phone running reasonably recent software, you’ll then tap the icon of the app you want to pin, directly above its card in that Overview area. And there, you should see the Pin option.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-large large"><img loading="lazy" decoding="async" src="https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-app-pinning.jpg?quality=50&amp;strip=all&amp;w=1024" alt="Android security settings: App pinning" class="wp-image-3550594" srcset="https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-app-pinning.jpg?quality=50&amp;strip=all 2160w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-app-pinning.jpg?resize=300%2C283&amp;quality=50&amp;strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-app-pinning.jpg?resize=768%2C725&amp;quality=50&amp;strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-app-pinning.jpg?resize=1024%2C967&amp;quality=50&amp;strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-app-pinning.jpg?resize=1536%2C1451&amp;quality=50&amp;strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-app-pinning.jpg?resize=2048%2C1934&amp;quality=50&amp;strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-app-pinning.jpg?resize=738%2C697&amp;quality=50&amp;strip=all 738w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-app-pinning.jpg?resize=178%2C168&amp;quality=50&amp;strip=all 178w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-app-pinning.jpg?resize=89%2C84&amp;quality=50&amp;strip=all 89w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-app-pinning.jpg?resize=508%2C480&amp;quality=50&amp;strip=all 508w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-app-pinning.jpg?resize=381%2C360&amp;quality=50&amp;strip=all 381w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-app-pinning.jpg?resize=265%2C250&amp;quality=50&amp;strip=all 265w" width="1024" height="967" sizes="auto, (max-width: 1024px) 100vw, 1024px"/><figcaption class="wp-element-caption">Android’s app pinning security system makes it significantly safer to pass your phone off for someone else’s use.</figcaption></figure>
<p class="imageCredit">JR Raphael, IDG</p>
</div>
<p>Once you’ve tapped that, you won’t be able to switch apps, go back to your home screen, look at notifications, or do anything else until you exit the pinning and unlock the device. To do that, with gestures, you’ll swipe up from the bottom of your screen and hold your finger down — and with the old three-button nav setup, you’ll press the Back and Overview buttons at the same time.</p>
<h2 class="wp-block-heading" id="android-security-setting-15-guest-mode">Android security setting #15: Guest Mode</h2>
<p>If you want to go a step further and let someone else use all parts of your phone without ever encountering your personal information or being able to mess anything up, Android has an incredible system that’ll let you do just that — with next to no ongoing effort involved.</p>
<p>It’s called Guest Mode, and it’s been around since 2014, despite the fact that most folks have completely forgotten about it. For a detailed walkthrough of what it’s all about and how you can put it to use, see my separate <a href="https://www.computerworld.com/article/1638704/android-privacy-feature.html">Android Guest Mode guide</a>.</p>
<p>Just note that if you have a Samsung phone, that guide won’t do you much good — as Samsung has for no apparent reason opted to remove this standard operating system element from its software (insert tangentially related soapbox rant here). On Google’s own Pixel phones and most other Android devices, though, it’ll take you all of 20 seconds to set up and get ready.</p>
<h2 class="wp-block-heading" id="android-security-setting-16-find-hub">Android security setting #16: Find Hub</h2>
<p>Whether you’ve simply misplaced your phone around the house or office or you’ve actually lost it out in the wild, always remember that Android has its own built-in mechanism for finding, ringing, locking, and even erasing a device from afar.</p>
<p>Like Play Protect, the <a href="https://www.computerworld.com/article/1711957/find-my-device-android-phone.html">Android Find Hub (formerly Find My Device) feature</a> should be enabled by default. You can make sure by searching your system settings for <strong>Find Hub</strong> and then double-checking that the toggle next to “Allow device to be located” within that area is activated.</p>
<p>(Using a Samsung phone? Samsung provides its own superfluous, redundant service called Find My Mobile, but the native Google Android version will bring <em>all</em> of your devices — not only those made by Samsung — together into a single place, and it’s also much more versatile in how and where it’s able to work.)</p>
<p>Once you’ve confirmed the setting is enabled, if you ever need to track your phone down, just go to <a href="https://android.com/find" target="_blank" rel="noopener nofollow">android.com/find</a> from any browser. There’s also an official <a href="https://play.google.com/store/apps/details?id=com.google.android.apps.adm" target="_blank" rel="noopener nofollow">Find Hub Android app</a>, if you have another Android device and want to keep that function standing by and ready.</p>
<p>As long as you’re able to sign into your Google account, you’ll be able to pinpoint your phone’s last known location on a map and manage it remotely in a matter of seconds.</p>
<p>Find Hub is a fantastic resource to have — but in certain situations, you might get a missing phone back even faster with the help of a fellow hominid.</p>
<p>Give people a chance to do the right thing by adding an emergency contact that can be accessed and dialed with a few quick taps from your phone’s lock screen. To start, go to either the About Phone section of your Android settings or the Safety &amp; Emergency section, if you have it, and then find and tap the line labeled either “Emergency information” or “Emergency contacts.”</p>
<p>Follow the prompts there to add in an emergency contact — a close friend, family member, significant other, random raccoon, or whatever makes sense for you. (Hey, I’m not here to judge.)</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-large large"><img loading="lazy" decoding="async" src="https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-emergency-contacts-.jpg?quality=50&amp;strip=all&amp;w=1024" alt="Android security settings: Emergency contacts" class="wp-image-3550601" srcset="https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-emergency-contacts-.jpg?quality=50&amp;strip=all 2160w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-emergency-contacts-.jpg?resize=300%2C125&amp;quality=50&amp;strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-emergency-contacts-.jpg?resize=768%2C321&amp;quality=50&amp;strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-emergency-contacts-.jpg?resize=1024%2C428&amp;quality=50&amp;strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-emergency-contacts-.jpg?resize=1536%2C641&amp;quality=50&amp;strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-emergency-contacts-.jpg?resize=2048%2C855&amp;quality=50&amp;strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-emergency-contacts-.jpg?resize=1240%2C518&amp;quality=50&amp;strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-emergency-contacts-.jpg?resize=150%2C63&amp;quality=50&amp;strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-emergency-contacts-.jpg?resize=854%2C357&amp;quality=50&amp;strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-emergency-contacts-.jpg?resize=640%2C267&amp;quality=50&amp;strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2024/10/android-security-settings-emergency-contacts-.jpg?resize=444%2C185&amp;quality=50&amp;strip=all 444w" width="1024" height="428" sizes="auto, (max-width: 1024px) 100vw, 1024px"/><figcaption class="wp-element-caption">Emergency contacts may be one of Android’s simplest-seeming security settings — but it can also be one of the most important.</figcaption></figure>
<p class="imageCredit">JR Raphael, IDG</p>
</div>
<p>Easy peasy, right? Well, almost: The only challenge is that the emergency contact info isn’t exactly obvious or simple to find on the lock screen — go figure — so anyone who picks up your phone might not even notice it.</p>
<p>But wait! You can increase the odds considerably with one extra step: Head into the Display section of your settings and tap “Lock screen” (which may be hidden within an “Advanced” subsection, depending on your device), then tap the line labeled “Add text on lock screen.”</p>
<p>However you get there, once you find yourself facing a blank space for text input, enter something along the lines of: “If you’ve found this phone, please swipe up and then tap ‘Emergency’ and slide the bar alongside ‘Emergency info’ to notify me” (or whatever specific instructions make sense for the required steps on <em>your</em> specific device).</p>
<p>That message will then always show up on your lock screen — and as an added bonus, if there’s ever an actual emergency, you’ll be ready for that, too.</p>
<p>Using a Samsung phone? For no apparent reason (sensing a theme here?), Samsung has removed the direct emergency contact system and instead offers <em>only</em> the ability to place plain text on your lock screen. You can find that, though, by making your way into the Lock Screen section of your system settings and looking for the line labeled “Contact information.”</p>
<p>You can then type your emergency contact info directly into that area and hope that someone finds it and dials it from their own phone if the situation ever comes up.</p>
<h2 class="wp-block-heading" id="android-security-setting-18-theft-detection">Android security setting #18: Theft detection</h2>
<p>Our next four Android security settings revolve around the worst-case scenario of someone deliberately swiping your device and then trying to get at the data — whether yours or your company’s — that’s stored within it.</p>
<p>As of October 2024, Google’s added <a href="https://www.computerworld.com/article/3550499/google-android-security-enhancements.html">a trio of new Android theft detection security features</a> that are designed exactly with this possibility in mind. The first, Theft Detection Lock, relies on a combination of your phone’s sensors and AI to identify motions commonly associated with a phone being forcefully stolen.</p>
<p>If such actions occur, Android instantly and automatically locks the device on your behalf.</p>
<p>The option should be present on all Android devices running 2019’s Android 10 software and higher. To find it, head into the Security &amp; Privacy section of your system settings, tap “Device unlock,” and look for the “Theft protection” section within that area. In Samsung’s Android implementation, you’ll instead go into the Security &amp; Privacy section and then tap “Lost device protection” followed by “Theft protection.”</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-large"><img loading="lazy" decoding="async" src="https://b2b-contenthub.com/wp-content/uploads/2024/10/google-android-security-enhancements-theft-protection-setting.jpg?quality=50&amp;strip=all&amp;w=1024" alt="Google Android security enhancements: Theft protection option" class="wp-image-3550562" srcset="https://b2b-contenthub.com/wp-content/uploads/2024/10/google-android-security-enhancements-theft-protection-setting.jpg?quality=50&amp;strip=all 2160w, https://b2b-contenthub.com/wp-content/uploads/2024/10/google-android-security-enhancements-theft-protection-setting.jpg?resize=300%2C236&amp;quality=50&amp;strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2024/10/google-android-security-enhancements-theft-protection-setting.jpg?resize=768%2C603&amp;quality=50&amp;strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2024/10/google-android-security-enhancements-theft-protection-setting.jpg?resize=1024%2C804&amp;quality=50&amp;strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2024/10/google-android-security-enhancements-theft-protection-setting.jpg?resize=1536%2C1206&amp;quality=50&amp;strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2024/10/google-android-security-enhancements-theft-protection-setting.jpg?resize=2048%2C1608&amp;quality=50&amp;strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2024/10/google-android-security-enhancements-theft-protection-setting.jpg?resize=888%2C697&amp;quality=50&amp;strip=all 888w, https://b2b-contenthub.com/wp-content/uploads/2024/10/google-android-security-enhancements-theft-protection-setting.jpg?resize=214%2C168&amp;quality=50&amp;strip=all 214w, https://b2b-contenthub.com/wp-content/uploads/2024/10/google-android-security-enhancements-theft-protection-setting.jpg?resize=107%2C84&amp;quality=50&amp;strip=all 107w, https://b2b-contenthub.com/wp-content/uploads/2024/10/google-android-security-enhancements-theft-protection-setting.jpg?resize=611%2C480&amp;quality=50&amp;strip=all 611w, https://b2b-contenthub.com/wp-content/uploads/2024/10/google-android-security-enhancements-theft-protection-setting.jpg?resize=458%2C360&amp;quality=50&amp;strip=all 458w, https://b2b-contenthub.com/wp-content/uploads/2024/10/google-android-security-enhancements-theft-protection-setting.jpg?resize=318%2C250&amp;quality=50&amp;strip=all 318w" width="1024" height="804" sizes="auto, (max-width: 1024px) 100vw, 1024px"/><figcaption class="wp-element-caption">The recently added “Theft protection” option is the key to unlocking Google’s latest Android security additions.</figcaption></figure>
<p class="imageCredit">JR Raphael, IDG</p>
</div>
<p>However you get there, tap that line — then make sure the option for “Theft Detection Lock” is on and active to enable the added protection.</p>
<h2 class="wp-block-heading">Android security setting #19:<strong> </strong>Offline locking</h2>
<p>Going hand in hand with that Theft Detection Lock option is another relatively new Android security feature called Offline Device Lock.</p>
<p>It looks for <em>on-screen </em>behaviors that make it look like a phone’s fallen into the wrong hands — like an unusually long period of Wi-Fi and mobile data disconnection or a series of failed attempts at getting past your lock screen. And if any such activity is detected, it automatically locks the device to keep any intruders out.</p>
<p>This option is in that same “Theft protection” section of Android’s Security &amp; Privacy settings. All you’ve gotta do is activate it.</p>
<h2 class="wp-block-heading">Android security setting #20:<strong> </strong>Remote locking</h2>
<p>One last late-2024 addition to the Android security picture is something Google calls Remote Lock. It’s essentially an extra way to manually and quickly lock down your device from afar without having to use the full-fledged Android Find Hub system we went over a moment ago.</p>
<p>Once more, look in that “Theft protection” menu to find and enable the feature.</p>
<h2 class="wp-block-heading" id="android-security-setting-21-sim-card-safeguard">Android security setting #21: SIM card safeguard</h2>
<p>If your phone ever falls into the wrong hands and its finder has less-than-honorable intentions, you want to do anything you can to keep that person from being able to take over the device <em>entirely</em>.</p>
<p>And you’d never know it, but Android has an often-off-by-default option designed to protect you in exactly that way. Or, at least, <em>some</em> Android devices do.</p>
<p>Start by searching your system settings for <strong>SIM</strong>. Depending on your device and your specific configuration, you might see a couple of different options appear in the results — anything from “Confirm SIM deletion” to “Lock eSIM settings” or “SIM lock.” If you see any of those options, tap ’em and then follow the subsequent steps to secure that SIM.</p>
<p>It’s almost shockingly easy to handle — so long as you have the foresight to protect yourself <em>before</em> the need actually arises.</p>
<h2 class="wp-block-heading" id="android-security-setting-22-the-security-supermode">Android security setting #22: The security supermode</h2>
<p>Last but not least, if you find yourself wishing there were just a single simple switch that can enable <em>all</em> of the most advisable maximum-protection Android security settings for you in one fell swoop, this final option is exactly what the nerd doctor ordered.</p>
<p>It’s a sweeping security option called <a href="https://www.computerworld.com/article/4004401/android-16-advanced-protection-security.html">Android Advanced Protection</a>, and it’s available as of Google’s 2025 Android 16 update.</p>
<p>With Advanced Protection, you quite literally just flip one switch, and your device automatically activates a slew of security settings for you — including many (but not all!) of the options we’ve just gone over.</p>
<p>You can find the option by searching your system settings for <strong>Advanced Protection</strong>.</p>
<p>Flipping the switch within that section is a powerful start. But it’s still worth considering all the <em>individual </em>options in this collection, as some of the settings above go beyond what Advanced Protection will cover.</p>
<h2 class="wp-block-heading" id="one-more-thing-about-android-security">One more thing about Android security …</h2>
<p>Now that you’ve got your settings optimized and in order, set aside a bit of time to <a href="https://www.computerworld.com/article/1640119/android-security-safer-phone.html">perform an Android security checkup</a>. It’s an 18-step process I’ve created for the state of security on both your phone and your broader Google account — and it’s well worth doing at least once a year.</p>
<p>The best part of this checkup? It’s completely painless — and unlike with most preventative exams, removing your pants is entirely optional.</p>
<p><i>Get even more Googley knowledge with <a href="https://www.theintelligence.com/android-cw/" target="_blank" rel="noreferrer noopener"><strong>my Android Intelligence newsletter</strong></a> — three new things to try every Friday and six instant power-ups in your inbox today.</i></p>
</div>
<p><br />
<br />This story originally appeared on <a href="https://www.computerworld.com/article/1718177/android-settings-security.html" target="_blank">Computerworld </a></p>
]]></content:encoded>
					
		
		
		<media:content url="https://i1.wp.com/www.computerworld.com/wp-content/uploads/2025/12/1718177-0-33473300-1764756321-android-settings.jpg?quality=50&#038;strip=all&#038;w=1024&#038;ssl=1" medium="image"></media:content>
            	</item>
		<item>
		<title>Apple has a new AI chief for its AI future – Computerworld</title>
		<link>https://pagegoo.com/2025/12/apple-has-a-new-ai-chief-for-its-ai-future-computerworld/</link>
		
		<dc:creator><![CDATA[Computerworld]]></dc:creator>
		<pubDate>Wed, 03 Dec 2025 02:16:47 +0000</pubDate>
				<category><![CDATA[TECHNOLOGY]]></category>
		<guid isPermaLink="false">https://62.146.175.13/2025/12/apple-has-a-new-ai-chief-for-its-ai-future-computerworld/</guid>

					<description><![CDATA[In a departure that took almost as long as Siri needs to find some obscure music requests, Apple has announced a new vice president of AI: Amar Subramanya, who will replace former AI chief John Giannandrea. Subramanya will report directly to Craig Federighi, Apple’s senior vice president for software engineering. Giannandrea will “transition to an [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><br />
<br /><img decoding="async" src="https://www.computerworld.com/wp-content/uploads/2025/12/4099378-0-97558900-1764695532-Apples-keynote-event_guests_arrive_at_Steve_Jobs_Theater-03252019.jpg?quality=50&amp;strip=all" /></p>
<div>
<section class="wp-block-bigbite-multi-title"/>
<p>In a departure that took almost as long as Siri needs to find some obscure music requests, Apple has announced a new vice president of AI: Amar Subramanya, who will replace former AI chief John Giannandrea.</p>
<p>Subramanya will report directly to Craig Federighi, Apple’s senior vice president for software engineering. Giannandrea will “transition to an advisory role” pending planned retirement  next year. Certain roles previously occupied by Giannandrea will be shifted to Apple COO Sabih Khan and Senior Vice President for Services Eddy Cue. Subramanya will lead <a href="https://www.computerworld.com/article/3511199/everything-we-know-about-apple-intelligence.html">Apple Intelligence and Siri’s</a> next chapters.</p>
<p>“We are thankful for the role John played in building and advancing our AI work, helping Apple continue to innovate and enrich the lives of our users,” Tim Cook, Apple’s CEO, said in a statement. “AI has long been central to Apple’s strategy, and we are pleased to welcome Amar to Craig’s leadership team and to bring his extraordinary AI expertise to Apple. In addition to growing his leadership team and AI responsibilities with Amar’s joining, Craig has been instrumental in driving our AI efforts, including overseeing our work to bring a more personalized Siri to users next year.”</p>
</div>
<p><br />
<br />This story originally appeared on <a href="https://www.computerworld.com/article/4099378/apple-has-a-new-ai-chief-for-its-ai-future.html" target="_blank">Computerworld </a></p>
]]></content:encoded>
					
		
		
		<media:content url="https://i3.wp.com/www.computerworld.com/wp-content/uploads/2025/12/4099378-0-97558900-1764695532-Apples-keynote-event_guests_arrive_at_Steve_Jobs_Theater-03252019.jpg?quality=50&#038;strip=all&#038;w=1024&#038;ssl=1" medium="image"></media:content>
            	</item>
		<item>
		<title>Police consider corporate manslaughter charges over UK Post Office software linked to 13 suicides – Computerworld</title>
		<link>https://pagegoo.com/2025/12/police-consider-corporate-manslaughter-charges-over-uk-post-office-software-linked-to-13-suicides-computerworld/</link>
		
		<dc:creator><![CDATA[Computerworld]]></dc:creator>
		<pubDate>Tue, 02 Dec 2025 18:16:00 +0000</pubDate>
				<category><![CDATA[TECHNOLOGY]]></category>
		<guid isPermaLink="false">https://62.146.175.13/2025/12/police-consider-corporate-manslaughter-charges-over-uk-post-office-software-linked-to-13-suicides-computerworld/</guid>

					<description><![CDATA[“The primary and sole focus at present remains the offences of perverting the course of justice and perjury and this has not changed. However, as was done with fraud offences previously, advice is being sought from the Crown Prosecution Service (CPS) around the offences of corporate and gross negligent manslaughter,” the NPCC said without elaborating [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><br />
<br /><img decoding="async" src="https://www.computerworld.com/wp-content/uploads/2025/12/4099575-0-15774500-1764699211-UK_Post_Office_shutterstock_2473247023.jpg?quality=50&amp;strip=all" /></p>
<div>
<p>“The primary and sole focus at present remains the offences of perverting the course of justice and perjury and this has not changed. However, as was done with fraud offences previously, advice is being sought from the Crown Prosecution Service (CPS) around the offences of corporate and gross negligent manslaughter,” the NPCC said without elaborating on possible targets.</p>
<p>Separately, the NPCC said it was appealing for victims who signed non-disclosure agreements (NDAs) with the Post Office to come forward and speak to its investigation team. The NDAs would no longer be enforced, the NPCC said.</p>
<h2 class="wp-block-heading" id="false-horizon">False Horizon</h2>
<p>The Post Office started using Fujitsu’s Horizon accounting system in 1999, initially as ‘legacy’ Horizon until 2010 and then in a second version called Horizon Online, or HNG-X. Its purpose was to automate sales, stocktaking, and accounting across 18,500 post offices. Sub-postmasters were migrated from a paper-based accounting system to an online one that recorded all money going into and out of their accounts centrally.</p>
</div>
<p><br />
<br />This story originally appeared on <a href="https://www.computerworld.com/article/4099575/police-consider-corporate-manslaughter-charges-over-uk-post-office-software-linked-to-13-suicides.html" target="_blank">Computerworld </a></p>
]]></content:encoded>
					
		
		
		<media:content url="https://i2.wp.com/www.computerworld.com/wp-content/uploads/2025/12/4099575-0-15774500-1764699211-UK_Post_Office_shutterstock_2473247023.jpg?quality=50&#038;strip=all&#038;w=1024&#038;ssl=1" medium="image"></media:content>
            	</item>
		<item>
		<title>AI agents to enable ‘personal IT manager’ for every worker – Computerworld</title>
		<link>https://pagegoo.com/2025/12/ai-agents-to-enable-personal-it-manager-for-every-worker-computerworld/</link>
		
		<dc:creator><![CDATA[Computerworld]]></dc:creator>
		<pubDate>Tue, 02 Dec 2025 10:12:53 +0000</pubDate>
				<category><![CDATA[TECHNOLOGY]]></category>
		<guid isPermaLink="false">https://62.146.175.13/2025/12/ai-agents-to-enable-personal-it-manager-for-every-worker-computerworld/</guid>

					<description><![CDATA[“The third point is we see a democratization of DEX. DEX is not just for digital workplace leaders anymore, but also security and HR teams. Through what we call Assist — a conversational interface on top of our data — HR can say, ‘How many people do I have in this office?’ Or network professionals can say, ‘How many people are [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><br />
<br /><img decoding="async" src="https://www.computerworld.com/wp-content/uploads/2025/12/4098771-0-85523700-1764658998-250603_Nexthink%C2%A9wearesama_0345.jpg?quality=50&amp;strip=all" /></p>
<div>
<p>“The third point is we see a democratization of DEX. DEX is not just for digital workplace leaders anymore, but also security and HR teams. Through what we call Assist — a conversational interface on top of our data — HR can say, ‘How many people do I have in this office?’ Or network professionals can say, ‘How many people are having Wi-Fi problems in this particular location?’ Before, you needed to be an expert in DEX, but now you can do this with a conversational interface. </p>
<p>“So there are these three buckets: take DEX to employees with a personalized IT agent; support AI transformation in your company with AI Drive; and expand DEX to other teams. It’s a huge revolution.”</p>
<p><strong>A lot of the </strong><strong>AI market is now moving to</strong><strong>ward agents. </strong><strong>How will Nexthink’s platform evolv</strong><strong>e as you integrate agents </strong><strong>going forward?</strong><strong> </strong>“First of all, our vision for agents is as ‘helpers.’ We don’t want to replace people, we see it more like the pilot on the plane: you have an autopilot that is doing maybe 80% of the work, but there’s always a pilot supervising, giving feedback, and configuring. We see the job of IT becoming much more about supervising, training, and more strategic, with less busy work. </p>
</div>
<p><br />
<br />This story originally appeared on <a href="https://www.computerworld.com/article/4098771/nexthink-ceo-ai-agents-to-enable-personal-it-manager-for-every-worker.html" target="_blank">Computerworld </a></p>
]]></content:encoded>
					
		
		
		<media:content url="https://i0.wp.com/www.computerworld.com/wp-content/uploads/2025/12/4098771-0-85523700-1764658998-250603_Nexthink©wearesama_0345.jpg?quality=50&#038;strip=all&#038;w=1024&#038;ssl=1" medium="image"></media:content>
            	</item>
		<item>
		<title>Google is now the best at AI — but is it enough? – Computerworld</title>
		<link>https://pagegoo.com/2025/12/google-is-now-the-best-at-ai-but-is-it-enough-computerworld/</link>
		
		<dc:creator><![CDATA[Computerworld]]></dc:creator>
		<pubDate>Tue, 02 Dec 2025 02:12:19 +0000</pubDate>
				<category><![CDATA[TECHNOLOGY]]></category>
		<guid isPermaLink="false">https://62.146.175.13/2025/12/google-is-now-the-best-at-ai-but-is-it-enough-computerworld/</guid>

					<description><![CDATA[It took just under three years, but Google has finally caught up and overtaken its AI competitors. You remember how it was. When OpenAI released ChatGPT at the end of 2022 and created a world-wide sensation, Google was caught napping— and panicked. Despite the fact its researchers had introduced the architecture behind the new language [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><br />
<br /><img decoding="async" src="https://www.computerworld.com/wp-content/uploads/2025/12/4098843-0-22550800-1764621739-Gemini-3.png" /></p>
<div>
<section class="wp-block-bigbite-multi-title"/>
<p>It took just under three years, but Google has finally caught up and overtaken its AI competitors. </p>
<p>You remember how it was. When OpenAI released ChatGPT at the end of 2022 and created a world-wide sensation, Google was caught napping— and panicked. Despite the fact its researchers had introduced the architecture behind the new language models five years earlier, and despite having the now Nobel Prize-winning AI lab Deepmind in the corporate family, it was OpenAI, not Google, that developed the first widely usable model.</p>
<p>There’s a lot of rumor and speculation floating around about what it was like at Google at the time. CEO Sundar Pichai supposedly declared “Code Red” internally, something he later denied. Larry Page and Sergey Brin reportedly stepped back into the company in “founder mode.” Either way, Google reorganized and put Deepmind and its head, Demis Hassabis, in the driver’s seat to focus on the new large language models (LLMs).</p>
</div>
<p><br />
<br />This story originally appeared on <a href="https://www.computerworld.com/article/4098843/google-is-now-the-best-at-ai-but-is-it-enough.html" target="_blank">Computerworld </a></p>
]]></content:encoded>
					
		
		
		<media:content url="https://i2.wp.com/www.computerworld.com/wp-content/uploads/2025/12/4098843-0-22550800-1764621739-Gemini-3.png?w=1024&#038;ssl=1" medium="image"></media:content>
            	</item>
		<item>
		<title>Apple faces a new privacy fight in India – Computerworld</title>
		<link>https://pagegoo.com/2025/12/apple-faces-a-new-privacy-fight-in-india-computerworld/</link>
		
		<dc:creator><![CDATA[Computerworld]]></dc:creator>
		<pubDate>Mon, 01 Dec 2025 18:11:49 +0000</pubDate>
				<category><![CDATA[TECHNOLOGY]]></category>
		<guid isPermaLink="false">https://62.146.175.13/2025/12/apple-faces-a-new-privacy-fight-in-india-computerworld/</guid>

					<description><![CDATA[What will Apple do? Apple has resisted similar attempts to pre-install government-mandated apps in the past, so is likely to do so again. That’s because the company understands that once you permit one government to install apps on devices, every government will do the same – and since these apps aren’t necessarily designed within Apple’s [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><br />
<br /><img decoding="async" src="https://www.computerworld.com/wp-content/uploads/2025/12/4098695-0-61966500-1764607166-Apple-iPhone-17-color-lineup-250909.jpg?quality=50&amp;strip=all" /></p>
<div>
<h2 class="wp-block-heading"><strong>What will Apple do?</strong></h2>
<p>Apple has resisted similar attempts to pre-install government-mandated apps in the past, so is likely to do so again. That’s because the company understands that once you permit one government to install apps on devices, every government will do the same – and since these apps aren’t necessarily designed within Apple’s own privacy and security guidelines, they might be unsafe. This raises the specter of state surveillance being just one app install away. </p>
<p>Speaking to <em><a href="https://www.reuters.com/sustainability/boards-policy-regulation/india-orders-mobile-phones-preloaded-with-government-app-ensure-cyber-safety-2025-12-01/" target="_blank" rel="noreferrer noopener">Reuters</a></em>, Internet advocacy lawyer Mishi Choudhary said the demand “effectively removes user consent as a meaningful choice.”</p>
<p>It is worth notingthat while Apple will resist government attempts to chip away at the privacy and security of its platforms, the company remains subject to the law. That is why it may already have created a backdoor vulnerability in the iPhone to meet demands made by the <a href="https://www.computerworld.com/article/4067081/uk-government-still-wants-apple-to-break-data-encryption.html">rogue UK government</a>, and it’s why in China it ensures iCloud data is stored on <a href="https://www.bbc.co.uk/news/technology-44870508" target="_blank" rel="noreferrer noopener">locally-based servers</a>. Ultimately, and perhaps, sadly, if people want to oppose creeping state surveillance, they have to be willing to oppose it themselves in the political sphere, rather than relying on private companies to fight on their behalf. Apple, like anyone else, must act within the law, even when the law is foolish, dangerous, or misconstrued.</p>
</div>
<p><br />
<br />This story originally appeared on <a href="https://www.computerworld.com/article/4098695/apple-faces-a-new-privacy-fight-in-india.html" target="_blank">Computerworld </a></p>
]]></content:encoded>
					
		
		
		<media:content url="https://i3.wp.com/www.computerworld.com/wp-content/uploads/2025/12/4098695-0-61966500-1764607166-Apple-iPhone-17-color-lineup-250909.jpg?quality=50&#038;strip=all&#038;w=1024&#038;ssl=1" medium="image"></media:content>
            	</item>
		<item>
		<title>Why security needs a step change to thwart cyber attacks amid surging innovation – Computerworld</title>
		<link>https://pagegoo.com/2025/12/why-security-needs-a-step-change-to-thwart-cyber-attacks-amid-surging-innovation-computerworld/</link>
		
		<dc:creator><![CDATA[Computerworld]]></dc:creator>
		<pubDate>Mon, 01 Dec 2025 10:09:44 +0000</pubDate>
				<category><![CDATA[TECHNOLOGY]]></category>
		<guid isPermaLink="false">https://62.146.175.13/2025/12/why-security-needs-a-step-change-to-thwart-cyber-attacks-amid-surging-innovation-computerworld/</guid>

					<description><![CDATA[As enterprise digitization accelerates to drive growth and meet customer expectations, it’s vital security leaders have the right tools and strategies to keep businesses secure. Take AI innovation for example. While its transformative impact is clear, security leaders must ensure these activities do not unwittingly widen “attack surfaces”. Beyond AI threats, issues such as unpatched [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><br />
</p>
<div>
<section class="wp-block-bigbite-multi-title"/>
<p>As enterprise digitization accelerates to drive growth and meet customer expectations, it’s vital security leaders have the right tools and strategies to keep businesses secure.</p>
<p>Take AI innovation for example. While its transformative impact is clear, security leaders must ensure these activities do not unwittingly widen “attack surfaces”.</p>
<p>Beyond AI threats, issues such as unpatched systems still contribute to a large percentage of security breaches.</p>
<p>Often, these vulnerabilities lead to preventable breaches. <a href="https://www.servicenow.com/uk/premium/resource-center/analyst-report/ponemon-vulnerability-survey.html" target="_blank" rel="noreferrer noopener">Industry estimates</a> put the number of breaches due to unpatched systems at around 60%.</p>
<p>The <a href="https://www.gov.uk/government/publications/the-experiences-and-impact-of-ransomware-attacks-on-victims/the-experiences-and-impacts-of-ransomware-attacks-on-individuals-and-organisations#impact-of-ransomware-attack" target="_blank" rel="noreferrer noopener">UK government</a> found that “weaknesses in cyber security systems, such as portals, unpatched servers, unpatched firewalls and insecure remote desktops were common vectors of attacks” leading, especially, to ransomware.</p>
<p>New vulnerabilities present a real, and growing risk. In 2024, almost one in four vulnerabilities were exploited on or before they were disclosed in public, according to research by <a href="https://www.vulncheck.com/blog/2024-exploitation-trends" target="_blank" rel="noreferrer noopener">VulnCheck</a>.</p>
<div class="extendedBlock-wrapper block-coreImage undefined">
<figure class="wp-block-image size-large"><img fetchpriority="high" decoding="async" src="https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2389261825.jpg?quality=50&amp;strip=all&amp;w=1024" alt="Meticulous IT programmer setting up high tech facility advanced cybersecurity firewalls and intrusion detection systems. Adept serviceman preventing hacking, malware, and denial of service attacks" class="wp-image-4098359" srcset="https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2389261825.jpg?quality=50&amp;strip=all 5472w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2389261825.jpg?resize=300%2C168&amp;quality=50&amp;strip=all 300w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2389261825.jpg?resize=768%2C432&amp;quality=50&amp;strip=all 768w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2389261825.jpg?resize=1024%2C576&amp;quality=50&amp;strip=all 1024w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2389261825.jpg?resize=1536%2C864&amp;quality=50&amp;strip=all 1536w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2389261825.jpg?resize=2048%2C1152&amp;quality=50&amp;strip=all 2048w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2389261825.jpg?resize=1240%2C697&amp;quality=50&amp;strip=all 1240w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2389261825.jpg?resize=150%2C84&amp;quality=50&amp;strip=all 150w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2389261825.jpg?resize=854%2C480&amp;quality=50&amp;strip=all 854w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2389261825.jpg?resize=640%2C360&amp;quality=50&amp;strip=all 640w, https://b2b-contenthub.com/wp-content/uploads/2025/12/shutterstock_2389261825.jpg?resize=444%2C250&amp;quality=50&amp;strip=all 444w" width="1024" height="576" sizes="auto, (max-width: 1024px) 100vw, 1024px" loading="lazy"/><figcaption class="wp-element-caption">
<p>2389261825</p>
</figcaption></figure>
<p class="imageCredit">shutterstock/DC Studio</p>
</div>
<h2 class="wp-block-heading" id="put-to-the-test">Put to the test</h2>
<p>To address these risks, enterprises need an effective vulnerability management strategy. This includes monitoring of threat intelligence sources, and regular vulnerability scanning. Organizations also need robust policies in place, to ensure that vendors’ software patches are applied promptly.</p>
<p>But for businesses to have a full picture of their vulnerabilities, they need to go further.</p>
<p>Conventional penetration testing (commonly called pentesting) is carried out by teams of security specialists.</p>
<p>Pentesting is effective, but as a manual process it is time consuming, expensive, and sometimes disruptive to the business. The security consulting firm and <a href="https://www.crest-approved.org/" target="_blank" rel="noreferrer noopener">CREST</a> member SECFORCE <a href="https://www.secforce.com/the-blog/pen-testing-price-list-uk-and-eu-guide-2025/" target="_blank" rel="noreferrer noopener">calculates</a> this costs to around £1200 (€1400) a day. Longer engagements can easily add up to significant fees.</p>
<p>Tests and scans must also be acted on. Unless the reporting process is linked to changes in the organization’s security, risks will remain.</p>
<h2 class="wp-block-heading" id="automated-response">Automated response</h2>
<p>Increasingly, CISOs are turning to automation, to detect threats more quickly and respond more effectively.</p>
<p>Vulnerability scanning, patch management and prioritization are two areas where enterprises can reduce the workloads on security teams through greater use of automation.</p>
<p>But even areas such as penetration testing can be automated. Automation cuts costs and frees up security experts to focus on the most pressing threats.</p>
<p>In addition, automated scanning and testing can run constantly in the background, picking up new threats as they emerge. This helps enterprises to move to near-time detection and response, closing down attacks before they cause damage.</p>
<p>This approach allows security teams to scale up their operations to cover more complex IT architectures and an expanding attack surface, without the need for more human testers.</p>
<p>Through automation, security teams can carry out more frequent and more comprehensive assessments, across more systems.</p>
<p>A well-designed system, such as those aligned to the MITRE ATT&amp;CK framework, will cover applications, networks and endpoints, using the latest algorithms to detect suspicious activity.</p>
<p>Furthermore, automated testing removes the risk of human error. And, as it runs in the background, and integrates with existing security tools, it reduces the disruption often associated with manual security tests and simulations. A good-quality scanning and testing system will also automate reporting, saving time for security analysts.</p>
<p>Automated vulnerability scanning, patch management and penetration testing cannot stop cyber attacks. But they provide a faster and more comprehensive response, helping  businesses become more secure.</p>
<p>Find out how T-Systems can help you rethink your security with our <a href="https://www.t-systems.com/de/en/security/gated-content/comprehensive-security-for-enterprises" target="_blank" rel="noreferrer noopener">comprehensive security guide</a> and state of the art services like <a href="https://www.t-systems.com/de/en/security/solutions/automated-penetration-testing-services" target="_blank" rel="noreferrer noopener">automated pentesting</a>.</p>
</div>
<p><br />
<br />This story originally appeared on <a href="https://www.computerworld.com/article/4098356/why-security-needs-a-step-change-to-thwart-cyber-attacks-amid-surging-innovation.html" target="_blank">Computerworld </a></p>
]]></content:encoded>
					
		
		
		<media:content url="https://i1.wp.com/www.computerworld.com/wp-content/uploads/2025/12/4098356-0-18419600-1764578515-shutterstock_2389261825.jpg?quality=50&#038;strip=all&#038;w=1024&#038;ssl=1" medium="image"></media:content>
            	</item>
		<item>
		<title>Microsoft’s Fara-7B brings AI agents to the PC with on-device automation – Computerworld</title>
		<link>https://pagegoo.com/2025/11/microsofts-fara-7b-brings-ai-agents-to-the-pc-with-on-device-automation-computerworld/</link>
		
		<dc:creator><![CDATA[Computerworld]]></dc:creator>
		<pubDate>Sat, 29 Nov 2025 18:01:53 +0000</pubDate>
				<category><![CDATA[TECHNOLOGY]]></category>
		<guid isPermaLink="false">https://62.146.175.13/2025/11/microsofts-fara-7b-brings-ai-agents-to-the-pc-with-on-device-automation-computerworld/</guid>

					<description><![CDATA[“In dynamic enterprise environments with frequent UI changes, these agents risk brittleness unless paired with augmented data management, adaptive retraining, and fallback mechanisms; therefore, at this stage, they are more suited for controlled workflows than mission-critical automation,” Dai said. Performance is only one part of the equation. Enterprises will also need stronger controls before allowing [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><br />
<br /><img decoding="async" src="https://www.computerworld.com/wp-content/uploads/2025/11/4095833-0-21692700-1764068022-microsoft-ai-agents-windows.jpg?quality=50&amp;strip=all" /></p>
<div>
<p>“In dynamic enterprise environments with frequent UI changes, these agents risk brittleness unless paired with augmented data management, adaptive retraining, and fallback mechanisms; therefore, at this stage, they are more suited for controlled workflows than mission-critical automation,” Dai said.</p>
<p>Performance is only one part of the equation. Enterprises will also need stronger controls before allowing such agents to run unsupervised on internal systems.</p>
<p>“These agents are convenient, but a rogue action could cause damage,” Jain added. “You need strong governance frameworks in place before deploying them at scale.”</p>
<p>Sheel said firms should define clear human-oversight points, such as when “Critical Points” arise, maintain audit trails for every action the agent takes, enforce role-based access controls, and monitor performance and errors continuously. “They should also include a remediation strategy for when the agent makes mistakes or behaves undesirably, and ensure data governance, privacy, and compliance policies are built into the agent’s workflows,” Sheel added.</p>
</div>
<p><br />
<br />This story originally appeared on <a href="https://www.computerworld.com/article/4095833/microsofts-fara-7b-brings-ai-agents-to-the-pc-with-on-device-automation.html" target="_blank">Computerworld </a></p>
]]></content:encoded>
					
		
		
		<media:content url="https://i0.wp.com/www.computerworld.com/wp-content/uploads/2025/11/4095833-0-21692700-1764068022-microsoft-ai-agents-windows.jpg?quality=50&#038;strip=all&#038;w=1024&#038;ssl=1" medium="image"></media:content>
            	</item>
		<item>
		<title>EU ‘Chat Control’ proposals should be red flag to businesses everywhere</title>
		<link>https://pagegoo.com/2025/11/eu-chat-control-proposals-should-be-red-flag-to-businesses-everywhere/</link>
		
		<dc:creator><![CDATA[Computerworld]]></dc:creator>
		<pubDate>Sat, 29 Nov 2025 09:58:45 +0000</pubDate>
				<category><![CDATA[TECHNOLOGY]]></category>
		<guid isPermaLink="false">https://62.146.175.13/2025/11/eu-chat-control-proposals-should-be-red-flag-to-businesses-everywhere/</guid>

					<description><![CDATA[Data privacy campaigners have warned that any celebration of the news that the European Union (EU) has abandoned its plans to break end-to-end encryption in mobile messaging apps could be short-lived.  According to one expert, this announcement should be a “red flag” to organizations operating within Europe. There has been a long-standing threat to end-to-end [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><br />
<br /><img decoding="async" src="https://www.computerworld.com/wp-content/uploads/2025/11/4097740-0-66040400-1764297484-shutterstock_2190330899.jpg?quality=50&amp;strip=all" /></p>
<div id="remove_no_follow">
<div class="grid grid--cols-10@md grid--cols-8@lg article-column">
<div class="col-12 col-10@md col-6@lg col-start-3@lg">
<div class="article-column__content">
<section class="wp-block-bigbite-multi-title">
<div class="container"></div>
</section>
<p>Data privacy campaigners have warned that any celebration of the news that the European Union (EU) has abandoned its plans to break end-to-end encryption in mobile messaging apps could be short-lived.  According to one expert, this announcement should be a “red flag” to organizations operating within Europe.</p>
<p>There has been a <a href="https://www.csoonline.com/article/2154094/chat-apps-end-to-end-encryption-threatened-by-eu-legislation.html" target="_blank">long-standing threat to end-to-end encryption</a> within Europe, as tech companies have battled with legislators over the EU Council’s attempt to limit messages shared by child sexual abusers through scanning of communications. Hoping to calm companies’ fears, on November 26, the <a href="https://www.consilium.europa.eu/en/press/press-releases/2025/11/26/child-sexual-abuse-council-reaches-position-on-law-protecting-children-from-online-abuse/" target="_blank" rel="noreferrer noopener">Council issued a statement</a> saying that all monitoring of communications will be performed by providers on a voluntary basis. It also announced a modified approach to the automated scans, dubbed <a href="https://www.patrick-breyer.de/en/posts/chat-control/" target="_blank" rel="noreferrer noopener">Chat Control</a> by privacy campaigners, as a new way of tackling child abuse online.</p>
<p>However, privacy campaigner and former member of European parliament <a href="https://www.patrick-breyer.de/en/" target="_blank" rel="noreferrer noopener">Patrick Breyer</a> noted, “the enterprise aspect was often overlooked in this debate.”</p>
<p>While there has been plenty of talk about the protection of individuals, Breyer said that, for CISOs and enterprises, the EU proposals should be a red flag. He pointed out there could be a real risk of the leakage of sensitive data. “The technology has high error rates. For a corporation, a ‘false positive’ could mean that confidential internal documents, code, or strategic plans are flagged and sent to external authorities or police forces without the company’s knowledge,<strong>”</strong> he said. </p>
<p>Breyer has been a long time critic of the EU proposals, and feels that the move to voluntary monitoring of communications is not enough protection.</p>
<p><strong>“</strong>The headlines are misleading: Chat Control is not dead, it is just being privatized<strong>,”</strong>  wrote <a href="https://www.patrick-breyer.de/en/reality-check-eu-council-chat-control-vote-is-not-a-retreat-but-a-green-light-for-indiscriminate-mass-surveillance-and-the-end-of-right-to-communicate-anonymously/" target="_blank" rel="noreferrer noopener">Breyer on his website</a>. <strong>“</strong>What the Council endorsed today is a Trojan Horse. By cementing ‘voluntary’ mass scanning, they are legitimizing the warrantless, error-prone mass surveillance of millions of Europeans by US corporations, while simultaneously killing online anonymity through the backdoor of age verification.”</p>
<p>Breyer’s position is supported by another digital privacy group, European Digital Rights (EDRi). It posted <a href="https://www.linkedin.com/posts/european-digital-rights_chatcontrol-csaregulation-encryption-activity-7399432202427748352-Psot/" target="_blank" rel="noreferrer noopener">a statement on LinkedIn</a> saying that digital rights may still be at risk. “We want to be absolutely certain that lawmakers don’t leave loopholes that would lead to harm,” it said. “For example, the Council text would have been better if it expressly rejected the use of ‘client-side scanning’ tools, as a lot of discretion is still left to national authorities.”</p>
<p>In particular, EDRi drew attention to the possibility of voluntary monitoring. “This means that Big Tech companies can decide to scan your personal messages, without suspicion that you’re doing anything wrong, and apply error-prone predictive AI tools to look for evidence of abuse. This sort of scanning already happens, with very little transparency and oversight, and no proper legal basis,” said the organization.</p>
<p>And for corporations looking to protect their intellectual data and maintain secure communications, the threat is very real, said Breyer. “In short: If this proposal passes, no European company can guarantee the confidentiality of its communications any more.”</p>
<p>This article originally appeared on <a href="https://www.csoonline.com/article/4097728/eu-chat-control-proposals-should-be-red-flag-to-businesses-everywhere.html" target="_blank">CSOonline</a>.</p>
</div>
</div>
</div>
</div>
<p><br />
<br />This story originally appeared on <a href="https://www.computerworld.com/article/4097740/eu-chat-control-proposals-should-be-red-flag-to-businesses-everywhere-2.html" target="_blank">Computerworld </a></p>
]]></content:encoded>
					
		
		
		<media:content url="https://i3.wp.com/www.computerworld.com/wp-content/uploads/2025/11/4097740-0-66040400-1764297484-shutterstock_2190330899.jpg?quality=50&#038;strip=all&#038;w=1024&#038;ssl=1" medium="image"></media:content>
            	</item>
		<item>
		<title>Spotlight: Making the most of multicloud</title>
		<link>https://pagegoo.com/2025/11/spotlight-making-the-most-of-multicloud/</link>
		
		<dc:creator><![CDATA[Computerworld]]></dc:creator>
		<pubDate>Sat, 29 Nov 2025 01:57:53 +0000</pubDate>
				<category><![CDATA[TECHNOLOGY]]></category>
		<guid isPermaLink="false">https://62.146.175.13/2025/11/spotlight-making-the-most-of-multicloud/</guid>

					<description><![CDATA[For IT leaders navigating multicloud environments, success depends on strategic alignment across business units, robust governance frameworks, and proactive security postures. While multicloud offers agility and vendor flexibility, it also introduces challenges in visibility, compliance, and developer productivity. In this special report, you’ll learn how to take advantage of the benefits of using multiple clouds, [&#8230;]]]></description>
										<content:encoded><![CDATA[<p><br />
<br /><img decoding="async" src="https://www.computerworld.com/wp-content/uploads/2025/11/4090474-0-19960200-1764324248-multicloud-spotlight-cio-shutterstock_269794933595.jpg?quality=50&amp;strip=all" /></p>
<div>
<p>For IT leaders navigating multicloud environments, success depends on strategic alignment across business units, robust governance frameworks, and proactive security postures. While multicloud offers agility and vendor flexibility, it also introduces challenges in visibility, compliance, and developer productivity. In this special report, you’ll learn how to take advantage of the benefits of using multiple clouds, avoid common pitfalls, and ensure that multicloud is worth the investment.</p>
<p><span data-contrast="none">Contents:</span><span data-ccp-props="{"> </span></p>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{" data-aria-posinset="1" data-aria-level="1"><span data-contrast="auto">5 challenges every multicloud strategy must address</span><span data-ccp-props="{"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{" data-aria-posinset="2" data-aria-level="1"><span data-contrast="none">Securing a multicloud environment</span><span data-ccp-props="{"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{" data-aria-posinset="3" data-aria-level="1"><span data-contrast="none">Multicloud ROI: Maximizing value and efficiency </span><span data-ccp-props="{"> </span></li>
</ul>
<ul>
<li data-leveltext="" data-font="Symbol" data-listid="12" data-list-defn-props="{" data-aria-posinset="4" data-aria-level="1"><span data-contrast="none">How to excel in multicloud: The new checklist</span><span data-ccp-props="{"> </span></li>
</ul></div>
<p><br />
<br />This story originally appeared on <a href="https://us.resources.computerworld.com/resources/form?placement_id=7f710e0d-983c-4952-b7e2-d5221eb5d1a6&#038;brand_id=128&#038;locale_id=1" target="_blank">Computerworld </a></p>
]]></content:encoded>
					
		
		
		<media:content url="https://i3.wp.com/us.resources.computerworld.com/wp-content/uploads/2025/11/default_image1763146167.717.png?ssl=1" medium="image"></media:content>
            	</item>
	</channel>
</rss>
