The U.S. Federal Communications Commission has voted to allow telecom carriers to run trials with Internet Protocol networks replacing traditional, copper-based telephone systems....
Microsoft founder Bill Gates may be out as chairman as part of the move to replace CEO Steve Ballmer, Bloomberg is reporting...
Of all the lessons to be learned from the hacking of Naoki Hiroshima and the loss of his coveted @N Twitter handle, the most troubling is the one which will ultimately be the most difficult to solve. In online security, weak passwords and poor encryption standards may be part of the problem, but the biggest problem of all remains ourselves....
With sales of security software predicted to rise this year by Gartner, one of the top security software houses, Symantec, appears to be struggling in the very market it should be dominating....
IBM will house its email, communication and collaboration products in its Connections suite, whose scope until now has been limited to enterprise social networking (ESN) software....
In part four of a series on understanding the processes and tools behind an APT-based incident, CSO examines the Command & Control phase, often referred to as C2. During this phase, the attacker(s) are on the network, and depending on their objectives, will start focusing on their endgame....
PC makers have often struggled when it comes to selling smartphones, but China's Lenovo could be on the cusp of making a breakthrough. The company's US$2.9 billion deal to buy Motorola Mobility from Google might end up paving the way for Lenovo to become one of the rare PC makers with a prominent handset business....
Target said Wednesday that intruders accessed its systems by using credentials "stolen" from a vendor, one of the first details the retailer has revealed about how hackers got inside....
An MIT research team next month will show off a networked system of flash storage devices they say beats relying on DRAM and networked hard disks to handle Big Data demands....