Search

IT News

The security industry found its dream enemy in 2013 -- and new technical challenges too

2013 was the year we learned we must encrypt our data if we don't want the likes of the U.S. National Security Agency or the U.K. Government Communications Headquarters reading it as it crosses the Internet....

02.01.2014

In exascale, Japan stands apart with firm delivery plan

Japan intends to deliver an exascale supercomputer in six years. The firm completion date makes Japan novel among the nations in the race to build exascale systems....

02.01.2014

IT pro's revitalization guide 2014

Take a moment to retool your personal and professional priorities with some of our most insightful tech management and careers articles. Insider (registration required)...

02.01.2014

Apple strips CEO Cook of $4M in stock grants for poor share performance

Apple CEO Tim Cook received a compensation package of $4.25 million for the 2013 fiscal year, a 2% increase over the year before....

02.01.2014

Unencrypted Windows crash reports give 'significant advantage' to hackers, spies

Windows' error- and crash-reporting system sends a wealth of data unencrypted and in the clear, information that eavesdropping hackers or state security agencies can use to refine and pinpoint their attacks, a researcher said today....

02.01.2014

Looming disasters, and other tech predictions, for 2014 and beyond

More than most years, 2013 might be remembered for some ominous predictions of doom for the earth and its inhabitants....

02.01.2014

7 sneak attacks used by today's most devious hackers

Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users...

02.01.2014

Apple, Cisco, Dell unhappy over alleged NSA back doors in their gear

Germany's Der Spiegel reports that the NSA has compromised a wide range of hardware for years to enable its spying...

02.01.2014

More networking news,features and forums

...

01.01.2014

Target hackers try new ways to use stolen card data

The techniques used by hackers to access credit and debit card data from target shoppers suggests that the cyber crooks have found a troubling new way to stay ahead of the latest fraud detection processes....

01.01.2014

    SERVICES

  • - Consultancy and technical support
  • - Marketing support
  • - Training
eXTReMe Tracker