- Public sector fails to tackle £20.6bn a year fraud using big data
- Cybercriminals have access to 100 zero-day flaws on any day, NSS Labs calculates
- Natwest website targeted in DDOS cyber attack
- DARPA makes finding software vulnerabilities fun
- Flashlight app vendor settles with FTC over privacy violations
Gibbs ponders how a Starbucks coffee cup could become the greatest business edge
The continuing saga of Google's wireless snooping and the maelstrom it's generated won't end anytime soon.
Google is cleaning up its mess after the company says it mistakenly collecting browsing data from unencrypted Wi-Fi networks as part of its Street View project.
The recent formal approval of the IEEE 802.11n wireless standard marks not the end but the start of a wave of Wi-Fi innovation. In the next three to five years, the Wi-Fi experience will be very different from today.
Sometime on Friday, at the sprawling Hyatt Regency hotel in New Brunswick, N.J., an IEEE group called the Standards Board is expected to approve the 802.11n wireless LAN standard.
In honor of the 802.11n WiFi standard getting close to arriving after wandering through the desert for 40 years, let's look at wireless. Our focus today is on helping you WiFi better, even if it means doing less WiFi.
A just released Aberdeen Group research report identifies the steps taken by best-in-class enterprise IT groups to create secure, pervasive, manageable, reliable, high-performance Wi-Fi networks.
Singapore-based ZiiLabs has unveiled a new mobile computer that's like an Android-based iPod Touch. It supports advanced 3D and outputs full high-definition video -- but it's currently available only to developers.
As more enterprises deploy wall-to-wall Wi-Fi, they're finding end users voting with their network interface cards: given a choice, they go with wireless rather than wired access.
For a concept that's remarkably easy to reduce to a sound bite, bridging the gap between mobile phones and enterprise networks ("fixed-mobile convergence") remains stubbornly hard to implement.
In their quest to get Wi-Fi Internet connectivity, people have done some pretty desperate things over the years.
One thing you can depend on these days is that the claims made for wireless routers, like 300Mbit/sec. throughput and 1,000-foot range, are nothing more than digital pipe dreams. The plain and simple truth is that these speeds and distances just aren't going to happen in your home, office or any place on this planet.
Threat Emulation uses a sandbox as a separate, isolated environment in which files are open and run to determine whether they are safe or malicious. In this infographic, we look at its implementation and the technology required to avoid infecting a corporate network.
UltraISO is an ISO CD/DVD image file tool that creates, edits and converts. It is also a bootable CD/DVD maker that has the ability to ...
Think back to the last time all your employees were in the office, at their desks, on the same day. It’s no surprise that you might struggle, between travel and off-site meetings, remote staff, flexible schedules and sick days. In today's competitive business climate, organisations need to maintain productivity and connectedness with their staff, despite not always being onsite. In this whitepaper, we look at five ways you can improve productivity, no matter where employees are.
- Distracted consumers spend less time on social than email marketing: Report
- New report busts myths about millennials and their digital and social behaviour
- Twitter gobbles up more cookies with retargeted ads, says users have privacy choices
- How to start the journey towards customer-centricity
- Gaining efficiency around search-based marketing: REA Group's keyword quest