Windows PCs infected with the Conficker worm have turned into junk mail-spewing robots capable of sending billions of spam messages …
Analysis: Where did Sun go wrong?
Just before the crash of the dot-com boom that spawned the meteoric rise of Sun Microsystems Inc., then-CEO Scott McNealy …
Acer pushes multibrand strategy with product barrage
Acer Inc. took a big step forward with its multibrand strategy on Tuesday, aiming at increasingly smaller demographic slices of …
Trend Micro expands SaaS security strategy
Trend Micro expanded its software-as-a service strategy to reach a wider range of business customers while taking steps to keep …
IT pros: Private clouds a good first step to cloud computing
Deploying a private cloud network is a good way for enterprises to ease into cloud computing before deploying applications on …
Nokia hopes new app store will replicate App Store
Nokia has spent four years working on building an application distribution system, attracting millions of developers eager to sell to …
Conficker copycat prowls for victims, says Microsoft
An old, but little-known worm has copied some of the infection strategies of Conficker, the worm that raised a ruckus …
Dell keeps new Vostro laptops free of bloatware
Dell Inc. today added three new models to its Vostro line of small-business laptops, continuing a two-year-old policy under which …
Mobile Internet Device: A new category?
With Samsung's introduction of the Mondi handheld device at the International CTIA Wireless conference, the question of defining its product …
Attackers exploit critical PowerPoint vulnerability
For the second time in five weeks, Microsoft Corp. warned that hackers were exploiting a critical unpatched bug in its …
Does the iPhone belong in corporate networks?
The right mobile handset for business use depends greatly on the organization that's deploying them, according to participants in a …
Samsung introduces Mondi, the first WiMax ‘Mobile Internet Device’
Samsung Telecommunications America announced the first WiMax-enabled Mobile Internet Device (MID) today at the International CTIA Wireless conference. Called the …
Fake security software scammers jump on Conficker
Google's search rankings are being stuffed with links to fake security software that purports to remove Conficker, a widespread worm …
5 best router and switch features you never use
It's been said that Microsoft Word users only exploit 10% of the software's capabilities. The same might be true of …
Intel, Microsoft look away as beefed-up netbooks blur lines
Microsoft Corp. and Intel Corp.'s attempts to confine netbooks to the low end of the market to protect mainstream notebook …
Conficker on April 1st: Eve of destruction or big joke?
Security experts say Conficker.C (also called Downadup) presents a serious threat. Infected machines — said to number from 3 million …
RIM, others face uphill rivalry with App Store
If Research In Motion opens its BlackBerry App World online store next week as rumored, it will be the second …
Couple sues Acer over sluggish Vista performance
An Ohio couple has sued Acer America Corp., accusing the computer maker of deceiving customers by claiming that laptops with …
Rogue SharePoint sites pose security menace
SharePoint is easy to set up and easy to use, which makes it popular with the power user crowd. That …
Intel raises the bar in server chips with Nehalem
Intel's upcoming Xeon server chips incorporate significant advancements that could form the basis for future chips that could handle high-performance …