Tom Henderson, Network World

Tom Henderson

Network World

Bloomington, IN, United States

Contact Tom

Discover and connect with journalists and influencers around the world, save time on email research, monitor the news, and more.

Start free trial

Recent:
  • Unknown
Past:
  • Network World

Past articles by Tom:

REVIEW: Mojo wireless intrusion prevention system

Mojo's wireless access points can ID and mitigate threats and trigger alerts. → Read More

Vulnerability in Intel’s AMT could leave you open to attack

Intel issued a security advisory last week saying its AMT, Standard Manageability (ISM) and Small Business Technology (SBT) firmware versions 6 to 11.6 have a vulnerability. → Read More

Net neutrality is net new revenue

Rolling back net neutrality rules will spawn record shareholder returns and telco empires—and destroy the original concept of the internet. → Read More

Security certificates gone wrong

Some websites, including one secured by the U.S. Department of Homeland Security, fail in their use of security certificates. → Read More

Virtual assistants hear everything, so watch what you say. I’m not kidding

Virtual assistants such as Google Home and Amazon Echo lack security guards, raising questions about safety and privacy. → Read More

The IoT of bricks: Someone is bricking insecure IoT devices

BrickerBot takes IoT security into its own hands. It finds vulnerable IoT devices and disables them, creating potentially dangerous situations. → Read More

Linux Mint 18.1: Mostly smooth, but some sharp edges

A review of the latest version of Ubuntu-based operating system offers long-term support. → Read More

10 practical privacy tips for the post-privacy internet

ISPs and providers can now sell your personal data thanks to the U.S. Congress. Here’s what you can do to maintain your online privacy. → Read More

The insecurities list: 10 ways to improve cybersecurity

Cybersecurity threats are more prevalent than ever. But there are some basic things you can do to protect your company and your users. → Read More

Review: VMware vSphere gets much-needed facelift

vSphere 6.5 is easy to install, sports a new VM management console and takes a stab at Docker integration. → Read More

Pwn2Own 2017: Your stuff as mincemeat

Security teams gathered at Pwn2Own 2017 to hack your favorite software and found plenty of bugs, proving nothing is foolproof. → Read More

After the WikiLeaks dump: Do nothing

Don’t panic about WikiLeaks. If someone wants to hack your system, they will find a way. Your best option: Continue your security best practices. → Read More

Checklist for choosing a small cloud host or ISP

Use this checklist to select a cloud host or ISP—and prevent future problems. → Read More

Mobile World Congress 2017: Mobility monsters

GSMA has brought everything mobile to Mobile World Congress 2017 in Barcelona, painting a picture of mobile world domination. → Read More

REVIEW: Deep dive into Windows Server 2016

In this review, we will go through the various new and improved features of Windows Server 2016. We found that many of them worked as advertised, while others weren’t totally baked yet. → Read More

Outrageous: $475 to repair the S key on a MacBook Air

Without Apple Care, a broken S key on a MacBook Air turns into an outrageous $475 repair. → Read More

Harbinger of The Great Internet Wall arrives

President Trump’s executive order on immigration puts non-U.S. citizens’ data in jeopardy. → Read More

The latest database attacks: Tips of the icebergs

MongoDB, ElasticSearch and Hadoop have been hit by ransomware. This is just the beginning of such attacks. → Read More

Windows 10 peeping: Microsoft fails to understand the uproar

With each new Windows update malady, Microsoft loses the confidence of users who might otherwise find value in the product. → Read More

Rated insecurity: Faux Cat 6 cable sold on Amazon

Some Amazon sellers offer Cat 5 and Cat 6 Ethernet cable for cheap, but it is insecure—isn’t UL- or TIA-approved and is at risk for starting a fire. → Read More