- Hackers make drive-by download attacks stealthier with fileless infections
- Are your calls being intercepted? 17 fake cell towers discovered in one month
- NIST issues Best Practices on how to best use Secure Shell software
- Meet Tox, an open, privacy-focused Skype replacement
- Industrial software website used in watering hole attack
nexus - News, Features, and Slideshows
Does a bear take a leak in the woods? I assume so. And probably with about the same frequency as details of the Nexus 5 leak all over the Web. Following the FCC approval of a very Nexus-like handset from LG, a purported technical manual of the still-unofficial Nexus 5 has hit the net.
The trio of Android smartphones NASA blasted into orbit recently have ended their journey by burning up in the atmosphere, but not before snapping shots of Earth -- and the pictures don't look too bad.
Unless you're a huge Facebook fanatic, will this really be something you use every day? Time will tell.
You didn't really think Google was going to let Amazon hog all the Android tablet glory, did you?
2011 was a tumultuously transitional year for Cisco. The company came to the realization that its strategy for growth by entering new markets spread it too thin, distracted it from core markets and impacted profits. It cost thousands of employees their jobs and forced Cisco to scale back on its aggressive growth plans and tactics.
- Google Enterprise becomes Google for Work
- MSPs are in an increasingly fragmented environment: GFI Max
- Dicker Data net profit down 43 per cent in full year results
- Don’t forget devices in unified communications sales: Jabra
- Australian bitcoin company launches first online exchange in United Arab Emirates