Security researchers have compromised Microsoft Surface RT, Nexus 4 and Samsung Galaxy S4 devices by exploiting previously unknown vulnerabilities in Internet Explorer 11 running on Windows 8.1 and Google Chrome running on Android....
The estimated 860,000 users of the popular MacRumors web forum have been told to change their passwords immediately after hackers successfully compromised an admin account in order to steal personal and login data....
Understandably, the most-discussed phones in these Android roundups – which, I’m a bit staggered to realize, have now been going for about 16 months – have generally been the ones at the cutting edge, with the latest technology and the coolest new features....
IBM will eventually beat Amazon Web Services, writes CIO.com columnist Rob Enderle, but not because AWS has an inferior product. In many ways, AWS is better than IBM's cloud offering. But Big Blue's experience with enterprise customers, not to mention the federal government, shows that great businesses processes often beat great products....
Amazon Web Services recently won a reported $600 million contract to build the U.S. Central Intelligence Agency (CIA) a cloud. But that cloud will not look like any other cloud on the planet....
Google released emergency security updates for Chrome in order to patch critical vulnerabilities demonstrated Thursday by a security researcher at the Mobile Pwn2Own hacking competition....
The U.S. Federal Communications Commission has released a smartphone app that will allow users to measure the speed of their mobile broadband connection, while providing aggregate data to the agency for measuring nationwide mobile broadband network performance....
Cybersleuths on the trail of botnets, Trojans and other malware used to steal financial assets and intellectual property have a new resource, a Microsoft facility that it will share with others pursuing the same goals....
Amazon Web Services this week rolled out a new cloud-based data analytics tool named Kenesis, which can analyze massive amounts of data in real time and be paid for by the hour....
It is an IT nightmare: Businesses hit with the CryptoLocker malware find their electronic files locked up inside strong encryption and the extortionist operating the malware botnet demanding money to give them the security key that would let companies get their data back....