Of all the lessons to be learned from the hacking of Naoki Hiroshima and the loss of his coveted @N Twitter handle, the most troubling is the one which will ultimately be the most difficult to solve. In online security, weak passwords and poor encryption standards may be part of the problem, but the biggest problem of all remains ourselves....
IBM will house its email, communication and collaboration products in its Connections suite, whose scope until now has been limited to enterprise social networking (ESN) software....
The possibility of Wikipedia being taken over by attackers was just foiled by quick action on the part of Wikimedia Foundation, the nonprofit that operates Wikipedia, with the help of Check Point, the security firm that discovered the critical security hole in its code....
Cloud-based electronic medical records and analytics systems give Walgreens health data to diagnose and treat patients at in-store clinics....
A VPN bypass flaw discovered last week in Android Jelly Bean 4.3 also exists in the latest version of Google's mobile operating system, KitKat 4.4, Israeli researchers say....
Look out Amazon, Larry Ellison has got his eye on you....
Global tablet shipments are still on the rise, but are showing signs of dramatic slowing as consumer markets such as the U.S. become saturated, IDC said....
With visibility on both the network and device level, tremendous amounts of data are translated into intelligence that deciphers complicated network security transactions into manageable, actionable information. ...
PC makers have often struggled when it comes to selling smartphones, but China's Lenovo could be on the cusp of making a breakthrough. The company's US$2.9 billion deal to buy Motorola Mobility from Google might end up paving the way for Lenovo to become one of the rare PC makers with a prominent handset business....