- Invisible Russian Cyberweapon Stalked US and Ukraine Since 2005, New Research Reveals
- VMware Unwraps Hybrid Cloud Desktop Virtualization
- Microsoft Risks Security Reputation Ruin by Retiring XP
- How Code Marketplaces Can Cut Application Development Costs
- iOS 7.1: The Changes We Love (and The Ones We Don't)
- Xen Hypervisor Moves Into ARM Space
- Intel Bides Time on Faster Thunderbolt Connector
If every PC sold in the next 12 months was one destined to replace an existing Windows XP system, it would take more than a year and a half -- about 20 months -- to eradicate XP. Windows XP isn't going anywhere.
E-learning is a cost-effective, accessible way to boost your job skills without the hassles of 'traditional' degree programs.
A study of more than 1000 CIOs and senior decision makers has revealed that the tangled web of apps within large organisations is getting more complex and is putting strain on the IT department.
Rogue adverts that use social engineering to persuade users to install malware have displaced porn as the leading method of attack on mobile devices, according to a report from security firm Blue Coat.
'You almost have to be a superhuman with 25 hours a day to spend on security issues to be an effective large retailer CIO these days. And that simply doesn't exist.'
Incident responders have no good way of distinguishing inconsequential malware from highly damaging malware. They spend way too much time and resources chasing red herrings while truly malicious activity slips past.
Getting a jump on competing hypervisors, the open source Xen is preparing for the day when ARM processors will run virtual machines.
With the new VMware Horizon DaaS offering, IT organizations can deploy enterprise-class virtual desktops to a public cloud, private cloud or seamlessly mix the two with a hybrid cloud deployment.
In the grand scheme of things, iOS 7.1 isn't really an earth-shattering update, especially coming on the heels of the massive redesign that was iOS 7. Here are just a few of the changes that have our staff applauding and, in some cases, griping.
The mysterious ‘Uroburos' cyberweapon named last week in Germany has been stalking its victims since as far back as 2005 and large enterprises and governments need to pay urgent attention to the threat it poses, UK security firm BAE Systems has urged.
The U.S. National Security Agency (NSA) has turned the European Union into a tapping "bazaar" in order to spy on as many EU citizens as possible, NSA leaker Edward Snowden said.
Based on a Polycom and Wainhouse report, this infographic from Polycom offers insights into how video collaboration is rapidly becoming an integral part of the business process for organizations worldwide.
With Google Glass starting to pick up steam, Sony doesn't want to get left too far behind.
With robots becoming increasingly powerful, intelligent and autonomous, a scientist at Rensselaer Polytechnic Institute says it's time to start making sure they know the difference between good and evil.
It looks like a regular smartphone case. But Wello is embedded with a plate containing sophisticated sensors that can detect vital signs as you hold your phone.
Microsoft's XP reaches "end-of-life" on April 8. But Apple's "Snow Leopard" (OS X 10.6) is already there--Apple is no longer patching the OS.
Here’s how the Oberoi Group took to implementing a VDI solution to streamline their internal operations and better control costs.
Organizations can now add machine-generated data to their palate of information sources that can be aggregated and analyzed, thanks to a new connector jointly developed by Tableau Software and Splunk.
Malware often does strange things, but this one -- which looked like Skype installed on a corporate domain controller -- was most "peculiar," says a security expert. >
A new commercial tool designed to allow cybercriminals to easily transform legitimate Android applications into malicious software has hit the underground market.