- Transform IT security process into business action, CSOs advise
- In Pictures: The biggest Internet security challenges of 2013
- Disqus scrambles after leak fuels Swedish tabloid exposé
- Identity-theft vulnerability fixed in Microsoft Office 365, says security firm
- Microsoft Patch Tuesday reinforces the value of software upgrades
- Amazon drones are 'fantasy,' says eBay CEO
- On snooping disclosures, AT&T and Internet companies are like night and day
- In his own words: Tony Abbott on the NBN
- TPG buys AAPT
- US faces major Internet image problem, former gov't official says
The U.S. Supreme Court has agreed to hear a controversial software patent case after a federal appeals court ruled that an abstract idea is not patentable simply because it is tied to a computer system.
The U.S. House of Representatives has passed a bill meant to discourage so-called patent trolls from filing multiple infringement lawsuits or demanding licensing deals over the objections of some groups representing small inventors.
The U.S. House of Representatives needs to take more time to debate and rewrite a bill targeting so-called patent trolls because several provisions would hurt legitimate patent holders, several critics of the bill said Tuesday.
Following reports about U.S. surveillance worldwide, a United Nations panel adopted Tuesday a resolution on potential threats to human rights such as the right to privacy in the digital age.
The U.S Federal Bureau of Investigation should make public a legal opinion it used to justify a past telephone records surveillance program because other agencies may still be relying on the document for surveillance justifications, the Electronic Frontier Foundation argued in court Tuesday.
With 2013 coming to an end, we took our annual look back at quotes from news stories over the last 12 months. Here are a handful that stuck with us through the year:
Last week Gen. David Petraeus, the director of the Central Intelligence Agency, resigned in response to what has turned out to be a much bigger scandal than it first appeared.
Well, that was fast. Do-it-yourself electronics kit maker and hobby retailer Adafruit recently announced that a hacker had won the company's Open Kinect Bounty. Spain-based hacker Hector Martin Cantero, who is known online as "marcan," released a proof-of-concept video Wednesday night showing the Kinect interfacing with his Linux-based laptop.
Today’s enterprises are rapidly adopting desktop virtualisation as a means to reduce operating costs, enable workplace flexibility, increase business agility and bolster their information security and compliance posture. Actually realising these benefits, however, depends upon ensuring the security and availability of the virtual desktop infrastructure. Find out how you can not only preserves the benefits promised by virtual desktops, but how it can maximise them. Click to download!
Publisher's notes: SoftPerfect Network Protocol Analyzer is an advanced, professional tool for analyzing, debugging, maintaining and monitoring local networks and Internet connections. It captures the ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- Facebook performance report signals rising brand engagement on social
- Australia's love of online search advertising continues, finds new report
- Why Shazam is helping advertisers hit the right tune with consumers
- Twitter, the protector of news?
- B2B customers are increasingly led by consumer habits and experience