- Public sector fails to tackle £20.6bn a year fraud using big data
- Cybercriminals have access to 100 zero-day flaws on any day, NSS Labs calculates
- Natwest website targeted in DDOS cyber attack
- DARPA makes finding software vulnerabilities fun
- Flashlight app vendor settles with FTC over privacy violations
The Nasdaq computer index Friday hit its highest point since November 2000, in the wake of the dot-com bust, despite mixed reports this week from the hardware and components sector.
The U.S. Defense Department may have found a new way to scan millions of lines of software code for vulnerabilities, namely by turning the practice into a set of video games and puzzles and have volunteers do the work.
The National Security Agency on Friday cited a 1981 executive order signed by then-President Ronald Reagan as the authority under which it is collecting location data daily from tens of millions of cell phones around the world.
The rise of virtualization has ushered in dramatic shifts in the computing landscape: Servers are more efficient and users can be more agile. But it's also created new challenges for backup and recovery.
IBM is developing software that will allow organizations to use multiple cloud storage services interchangeably, reducing dependence on any single cloud vendor and ensuring that data remains available even during service outages.
Storage vendors struggled with a decline in spending by the U.S. government and increased investment in public cloud capacity during the third quarter, according to IDC.
Teams of researchers are hoping to give life to a six-foot, 330-pound humanoid robot at the the Robotics Challenge in Homestead, Fla. on Dec. 20 and 21.
The core wars between x86 chip makers hit a lull a couple of years ago as processors were deemed to deliver enough performance, but Intel's plans to release a 15-core processor could change that.
At a wine bar in San Francisco on Wednesday, Broadcom Chairman and CTO Henry Samueli delivered some sobering news: Moore's Law isn't making chips cheaper anymore.
Sen. Edward Markey (D-MA) this week asked automakers what they're doing to protect vehicles from wireless hacking threats and privacy intrusions.
Many companies have established mobility as a core strategic technology, deploying corporate liable devices and allowing personally liable devices to connect to their networks and back-office applications. Yet few companies have established a realistic strategy of how to make the apps being utilised by end users truly enterprise controlled, secured and managed. Download to find out more!
When you think Open Source software, you may think of half-baked programs too hard to use, or perhaps lacking power. Well, think again. This Open ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- Distracted consumers spend less time on social than email marketing: Report
- New report busts myths about millennials and their digital and social behaviour
- Twitter gobbles up more cookies with retargeted ads, says users have privacy choices
- How to start the journey towards customer-centricity
- Gaining efficiency around search-based marketing: REA Group's keyword quest