Search

IT News

Researchers hack Internet Explorer 11 and Chrome at Mobile Pwn2Own

Security researchers have compromised Microsoft Surface RT, Nexus 4 and Samsung Galaxy S4 devices by exploiting previously unknown vulnerabilities in Internet Explorer 11 running on Windows 8.1 and Google Chrome running on Android....

18.11.2013

Hackers compromise 860,000 MacRumors forum accounts

The estimated 860,000 users of the popular MacRumors web forum have been told to change their passwords immediately after hackers successfully compromised an admin account in order to steal personal and login data....

18.11.2013

Motorola looks to sink the flagships with Moto G

Understandably, the most-discussed phones in these Android roundups – which, I’m a bit staggered to realize, have now been going for about 16 months – have generally been the ones at the cutting edge, with the latest technology and the coolest new features....

18.11.2013

IBM Will Beat Amazon Web Services Because Process Beats Product

IBM will eventually beat Amazon Web Services, writes CIO.com columnist Rob Enderle, but not because AWS has an inferior product. In many ways, AWS is better than IBM's cloud offering. But Big Blue's experience with enterprise customers, not to mention the federal government, shows that great businesses processes often beat great products....

18.11.2013

Amazon hints at details on its  CIA Franken-cloud

Amazon Web Services recently won a reported $600 million contract to build the U.S. Central Intelligence Agency (CIA) a cloud. But that cloud will not look like any other cloud on the planet....

18.11.2013

Google fixes Chrome vulnerabilities exploited at Pwn2Own contest

Google released emergency security updates for Chrome in order to patch critical vulnerabilities demonstrated Thursday by a security researcher at the Mobile Pwn2Own hacking competition....

18.11.2013

FCC app lets consumers check how mobile broadband providers stack up

The U.S. Federal Communications Commission has released a smartphone app that will allow users to measure the speed of their mobile broadband connection, while providing aggregate data to the agency for measuring nationwide mobile broadband network performance....

18.11.2013

Microsoft opens headquarters for digital crime fighters

Cybersleuths on the trail of botnets, Trojans and other malware used to steal financial assets and intellectual property have a new resource, a Microsoft facility that it will share with others pursuing the same goals....

18.11.2013

Amazon: New analytics tool can scrutinize massive amounts of data

Amazon Web Services this week rolled out a new cloud-based data analytics tool named Kenesis, which can analyze massive amounts of data in real time and be paid for by the hour....

18.11.2013

Businesses offer best practices for escaping CryptoLocker hell

It is an IT nightmare: Businesses hit with the CryptoLocker malware find their electronic files locked up inside strong encryption and the extortionist operating the malware botnet demanding money to give them the security key that would let companies get their data back....

18.11.2013

    SERVICES

  • - Consultancy and technical support
  • - Marketing support
  • - Training
eXTReMe Tracker