Google, Amazon and Microsoft have all made strategic moves to gain cloud market share -- and the 'cloud wars' are only getting started....
As the World Wide Web celebrates its 25th year Wednesday, top techies are looking ahead to the next 25 years when they say the Web will be woven more deeply, and seamlessly, into our lives....
Anti-virus software is still often considered a "checkbox" item for enterprise deployments, especially on Microsoft Windows, but over the decades, anti-virus software changed to do far more than just signature-based virus blocking. Today, the question is whether the type of anti-malware product that evolved from virus checking can transform again to be a part of a "breach detection system," or BDS...
A former SK Hynix employee is at the center of a brewing legal battle between top flash memory rivals after allegedly stealing trade secrets....
The U.S. Federal Communications Commission has approved AT&T's US$1.2 billion acquisition of competitor Leap Wireless, which sells prepaid mobile service under the Cricket brand....
The money spent by advertisers on the desktop will decline this year as people continue to reach for their smartphones to search for information, according to new data from eMarketer....
There used to be a whopping 110 million attack messages per day spoofing the Twitter domain name as cyber-criminals blasted out fake Twitter e-mail at intended victims to try and fool them into opening dangerous malware-infested links and other scams. But by adopting a messaging authentication protocol called Domain-based Message Authentication, Reporting and Conformance (DMARC), Twitter has seen that number drop to a few thousand....
The major consulting firms are all advising IT pros to remake their businesses into fully digital organizations. But as IT has known for years, transformation -- especially digital transformation -- is hard....
Windows XP's refugees have two choices on April 8, when Microsoft stops supporting the decade-old operating system (for consumers, anyway). This is assuming a new PC with a new operating system (even Windows 7) is, for whatever reason, out of the question. They could cling desperately to their old Windows XP system and face what could be a hacker feeding frenzy, something we don't recommend even if you take precautions. Or they could keep the old PC but install a new, free, and safe operating system--otherwise known...
Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane....