- Malware still running rings around security tools, eThreatz testing finds
- Microsoft to encrypt services, notify customers of gov't data requests
- NSA is said to collect cellphone location data across the world
- Passwords reset after 'Pony' botnet stole 2 million credentials
- Is your browser ready for shopping season?
Chorus's claims it will be at risk of not meeting its ultra-fast broadband commitments if it's forced to cut its copper wire prices appears genuine, New Zealand Communications Minister Amy Adams has been told.
Faster SANs are on the horizon as the next Fibre Channel specification, calling for 32G bps (bits per second), nears publication.
Intel has beefed up its networking silicon in a bid to capture a bigger share of enterprise, carrier and cloud-provider networks for its chip architecture.
Large smartphones with 5-inch or larger displays -- often called phablets -- are eating into sales of smaller tablets with screens in the 7-inch range.
The National Research Council is recommending creation of an early warning system for abrupt climate change.
Once upon a time some Carnegie Mellon University researchers came up with a scheme to use stories and pictures to help users live happily ever after by creating and remembering dozens of passwords – and avoiding use of the exact same passwords for multiple sites.
The wireless world is evolving rapidly in response to the explosion of intelligent devices, applications and data, and the IEEE 802.11ad standard, commonly known as WiGig, is poised to help.
A security researcher has released software and technical instructions for modifying a drone so that it can identify and hijack other drones.
Apple's iPhone could be getting a step closer to being officially offered on China's largest mobile network, after the nation's government finally issued 4G licenses to operate LTE TDD networks in the country.
Touch-ready notebook PCs will account for about 11% of all laptops shipped this year, an improvement over 2012 when customers had few choices if they wanted to smudge screens, a market research analyst said today.
This whitepaper describes, from an IT perspective, the issues that arise when allowing Android and iOS-based tablets and smartphones into the enterprise network—and the steps IT must take to maintain control while encouraging productivity and mobility. We outline the security considerations, risk mitigation options and the architecture required to support tablets and smartphones as consumer-grade devices accessing sensitive enterprise data. Download to find out more!
Angry IP Scanner (or simply ipscan) is an open-source and cross-platform network scanner designed to be fast and simple to use. It scans IP addresses ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- How to start the journey towards customer-centricity
- Gaining efficiency around search-based marketing: REA Group's keyword quest
- In 2014, brands will need to be digital first -- and we need to help them change
- Yahoo acquires mobile video app startup Ptch
- Why customer demographics aren't telling marketers the whole digital story