NASA has set up an impressive wireless connection that provides astronauts on International Space Station with Internet access so they …
Microsoft warns of IE zero-day used in Google Attack
A critical zero-day flaw in Internet Explorer was exploited as part of the attack on Google and other companies, according …
Microsoft warns of IE zero-day used in Google Attack
A critical zero-day flaw in Internet Explorer was exploited as part of the attack on Google and other companies, according …
Google Chrome OS may be security hotspot in 2010
Google's Chrome OS will be “poked” by hackers in 2010, in large part because it will be the “new kid …
Smartphone attacks, rogue antivirus, cloud breaches top 2010 security concerns
The rise of the Conficker worm and Heartland Payment Systems' enormous data breach were two defining security events in 2009. …
Five big questions about cloud computing
In a largely downbeat year, I couldn’t help but delight in Larry Ellison’s over-the-top takedown of cloud computing last September. …
Five big questions about cloud computing
In a largely downbeat year, I couldn't help but delight in Larry Ellison's over-the-top takedown of cloud computing last September. …
EMC finally rolls out FAST
EMC rolled out this week its much anticipated FAST software, which automatically migrates data between tiers of storage based on …
Start a new Mail message from any application
Does your Mac usage involve sending lots of e-mail messages? So much so that you'd love to be able to …
How to speed up everything
Has your PC lost its pep? How about your network connection, your printer, or even your phone? Here’s our guide …
How to speed up everything
Has your PC lost its pep? How about your network connection, your printer, or even your phone? Here's our guide …
New iPhone worm steals online banking codes, builds botnet
Hackers have borrowed a tactic from the world's first iPhone worm to build a botnet that steals data, including online …
BlackBerry security exec warns of smartphone DDoS attacks
BlackBerry and smartphone security in general hasn’t garnered much attention or concern over the past few year, at least from …
BlackBerry security exec warns of smartphone DDoS attacks
BlackBerry and smartphone security in general hasn't garnered much attention or concern over the past few year, at least from …
Nasty banking Trojan makes mules of victims
A sophisticated Trojan horse program designed to empty bank accounts has a new trick up its sleeve: It lies to …
Windows Mobile's demise greatly exaggerated, iSuppli says
Windows Mobile is not dead and, in fact, its use on smartphones will nearly triple by 2013, according to analyst …
New Trojan gives criminals full-service bank theft
Security experts agree that cyber-criminals are getting better, but a new Trojan takes things to a whole new level. The …
With ACS, Xerox will gain a firm growing quickly offshore
In agreeing to pay $6.4 billion for Affiliated Computer Services Inc., Xerox Corp. will gain a company that has so …
Block data leaks at the endpoint
It almost goes without saying that the greatest threat to the security of an enterprise network often comes from within. …
Domain-name abuse proliferates
For legitimate businesses, a domain name is a way to hang a shingle in cyberspace. In the criminal world, domain …