- Critical vulnerability in Git clients puts developers at risk
- Think North Korea hacked Sony? Think about this
- Researchers discover significant vulnerability that could control millions of Internet routers
- EU exploit vendors will need a ‘licence to sell’ from 31 December
- The 'grinch' isn't a Linux vulnerability, Red Hat says
industry verticals - News, Features, and Slideshows
Skin cancer can be detected more quickly and accurately by using cognitive computing-based visual analytics, researchers at IBM Research have found, in collaboration with New York's Memorial Sloan Kettering Cancer Center.
New England security group shares threat intelligence, strives to bolster region as cybersecurity mecca
The Advanced Cyber Security Center is a three year old organization with a bold mission to "bring together industry, university, and government organizations to address the most advanced cyber threats" and drive cybersecurity R&D in the New England region. Network World editor in Chief John Dix attended their most recent meeting in Boston and later tracked down ACSC Executive Director Charlie Benway and ACSC Board Chair William Guenther (CEO and Founder of Mass Insight) for a deep dive on the organization's goals.
With BMW's Remote Valet Parking Assistant may you never have to set foot in a parking garage again: The car should find a place to park on its own. The feature can be controlled from a smartwatch and will be demonstrated at the International CES trade show in January.
An Illinois hospital says someone attempted to blackmail it to stop the release of data about some of its patients.
After numerous reports indicated almost a year ago that Ford would do it, the carmaker announced this week that it has moved from Microsoft for Blackberry's QNX OS for its in-vehicle infotainment system known as Sync.
Though it seems as if we're sourrounded by innovative products, services and technologies, there's a growing counter argument that we're living in a dismal era. Science is hated. Real technological progress has stalled. And what we call innovation today really isn't very innovative.
Managing the wireless environment at the average college or university can be a difficult task at the best of times, and when students and staff start using personal hotspots the sort that provide wireless data access from the same -- it's not the best of times.
The truth, when it comes to computer employment data, is almost always ugly.
Some ne'er-do-wells steal test questions and answers, and cheaters buy that information, share answers in chat rooms, pay other people to take tests for them and bring a range of technologies and techniques into test centers to gain an edge.
If Amazon announces a smartphone on Wednesday, as is widely expected, it will face an avalanche of skeptics.
- Optus Business boosts Microsoft skills with Ensyst acquisition
- New Vocus/Amcom entity will have initial personnel restructure
- Schneider Electric wins 2014 Platts Global Energy Award
- New undersea cable to link Australia and New Zealand
- Communications service providers will face heavy capex in coming years: Ovum
- Fashioning a new style of customer interaction at The PAS Group
- Infographic: Top digital trends in 2015
- Technology, simplicity and culture: Behind the scenes of Sensis’ digital transformation
- Melbourne Stars look to fan engagement with mobile marketing offer
- Forget 2015: Bing already knows which people, products and trends will win next year