- Five Things to Know about Malware Before Driving It Out
- IT Pros Not Concerned about NSA Spying: Survey
- Stanford Team Tries for Zippier Wi-Fi in Crowded Buildings
- Tableau Folds Splunk Data into Business Analysis
- Tor Network Used to Hide 900 Botnets and Darknet Markets: Kaspersky
- New Tool Makes It Easier to Create Android Malware
- Skype-based Malware Shows How 'Peculiar' Malicious Code Can Be
A study of more than 1000 CIOs and senior decision makers has revealed that the tangled web of apps within large organisations is getting more complex and is putting strain on the IT department.
Rogue adverts that use social engineering to persuade users to install malware have displaced porn as the leading method of attack on mobile devices, according to a report from security firm Blue Coat.
'You almost have to be a superhuman with 25 hours a day to spend on security issues to be an effective large retailer CIO these days. And that simply doesn't exist.'
Incident responders have no good way of distinguishing inconsequential malware from highly damaging malware. They spend way too much time and resources chasing red herrings while truly malicious activity slips past.
Gamification in enterprise applications should focus on being functional instead of fun, according to motivation design expert, Jason Fox.
Having lots of Wi-Fi networks packed into a condominium or apartment building can hurt everyone's wireless performance, but Stanford University researchers say they've found a way to turn crowding into an advantage.
Microsoft's XP reaches "end-of-life" on April 8. But Apple's "Snow Leopard" (OS X 10.6) is already there--Apple is no longer patching the OS.
Here’s how the Oberoi Group took to implementing a VDI solution to streamline their internal operations and better control costs.
Organizations can now add machine-generated data to their palate of information sources that can be aggregated and analyzed, thanks to a new connector jointly developed by Tableau Software and Splunk.
Malware often does strange things, but this one -- which looked like Skype installed on a corporate domain controller -- was most "peculiar," says a security expert. >
A new commercial tool designed to allow cybercriminals to easily transform legitimate Android applications into malicious software has hit the underground market.
Are you still using Windows XP? In its latest Threat Report, security vendor F-Secure warns that a powerful zero-day attack against Windows XP is a matter of when--not if.
Without updates after April 8 Windows XP is expected to fall prey to any number of zero-day attacks for which Microsoft will provide no defense, but there are some things die-hard XP users can do to make their machines safer.
Goldman Sachs has been doing SDNs for a long time. It just wasn't called SDNs when the investment giant invested in network programmability.
More and more corporate IT departments around the world are straining under the weight of unnecessary software applications, according to a survey by Capgemini.
Ethernet's bandwidth would let every passenger in a car get real-time streaming video, its backers say.
Microsoft grossly overestimated the loyalty of those it thought were its most steadfast customers when it asked them to help get friends and family members to dump Windows XP, a corporate communications expert said.
Murali Ramalingam, a tech industry veteran with more than 20 years of experience, will also be Senior Director of Sales for the company’s India business.
Secretive Bitcoin creator Satoshi Nakamoto is a 64-year-old man living near Los Angeles who declines to talk about his role in the digital currency, according to a news report.
Your nearest dine-in Pizza Hut--if there is one--probably looks like it's trapped in the 80s, but it might someday leap into the future with tabletop touch screens for ordering and entertainment.