iPhoneys: The 4G edition
iPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.
Controversial Einstein systems to inspect U.S. government's Internet traffic.
Related:iPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.
Proof-of-concept code takes control of the computer during the boot process.
Exploit's amazingly easy to do, dangerously so on Linux.
Get our tweets and stay plugged in to networking news.
Businesses are adopting public cloud services despite numerous risks.
Related:iPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.
Proof-of-concept code takes control of the computer during the boot process.
Exploit's amazingly easy to do, dangerously so on Linux.
Get our tweets and stay plugged in to networking news.
Twitter haters abound, but what are the threats to Twitter itself?
Related:iPhone enthusiasts from around the Web offer their visions for the next-gen iPhone.
Proof-of-concept code takes control of the computer during the boot process.
Exploit's amazingly easy to do, dangerously so on Linux.
Get our tweets and stay plugged in to networking news.
Yours truly makes a living selling secondary Cisco gear, so I'm very biased, but nonetheless ecstatic to present the results of a survey, that in my...
This week's earnings reports by Microsoft and Apple couldn't be more different. Apple is soaring ahead on the success of the iPhone despite the...
The evolution of the multi-faceted Conficker worm is expected to take another turn this May 5th when the latest version, Conficker.E, will simply self-destruct 1
There are many reasons Sun wasn't able to survive as an independent company. Chief among these are Sun's hardware strategy and failure to execute after acquisitions. 7
Mainstream media hype leading up to the Conficker worm's April 1 software update may have distracted people from legitimate cyber threats, the U.S. Federal Bureau of...
Tracking down malicious computer activity can put researchers on shaky legal footing.
EDS will provide system integration and application modernization services for California Department of Corrections and Rehabilitation in $245 million, 4.5-year deal.
For the first time in its 23-year history as a public company, Microsoft's revenue dropped in year-over-year comparison as the company reported a whopping 6% decline in... 2
Nine months after opening its App Store, Apple announced on its Web site that it reached the milestone of selling its one billionth iPhone application on Thursday. The lucky... 1
Pirated copies of the Windows 7 Release Candidate have leaked to file-sharing sites, according to several reports on the Internet and searches of BitTorrent trackers.
Microsoft made headlines recently when The Wall Street Journal reported that the company planned to equip netbooks with the Starter edition of Windows 7, a semi-crippled... 3
Two words — cloud security — dominated discussion and drove the action this week at RSA Conference 2009. 2
President Barack Obama is due to receive a high-security BlackBerry 8830 soon, a Washington-based newspaper reported Thursday. 1
This week a panel assembled to discuss cloud computing. There was a lively discussion covering what cloud computing is (not just software-as-a-service), who benefits most...
Network technology may have played a critical role in law enforcement officials catching the alleged Craigslist killer before he was able to strike again.
Sikalosoft's Baby Shaker app made its way, however briefly, onto the App Store earlier this week--though not, one would argue, into our hearts. On Thursday, Macworld spoke to...
The recession has taken a deep toll on venture capital funding for network technology companies. 1
Imagine if four shipping companies are loading a cargo plane but neither the plane's operator nor any of the shippers bother to track how much weight is being crammed aboard. ......
Huge space tornadoes blasting gases at speeds of over a million miles per hour channel electric currents toward the Earth and help create the natural phenomena known as the Northern...
More details are emerging about how the FBI engages in hacking and the planting of spyware.This story goes back to at least 2001 when Bob Sullivan of MSNBC and Ted Birdis of AP broke... 4
Security is an ugly business because when you have a problem there's rarely an elegant, straightforward solution. What you usually wind up with is a solution that's just...
I remember when we moved my firm from a small SMB firewall solution, I won't mention names but the device was...
This week's earnings reports by Microsoft and Apple couldn't be more different. Apple is soaring ahead on the... 2
Microsoft released less-than-stellar earnings yesterday, attributing its first ever drop in year-over-year...
The X-Lite softphone client for the Mac OS X platform connects your Mac to Microsoft Office Communications...
The rumored union between IBM and Brocade will fail to dent Cisco's market share, according to a blog...
A better idea, according to NIST, would be to take a read through its new "Guide to Enterprise Password...
Yours truly makes a living selling secondary Cisco gear, so I'm very biased, but nonetheless ecstatic to... 2
Apple today announced its earnings for its most recent quarter, and reported earnings of $1.33 a share on... 3
Ever wondered what that blank slot in your ASA5505 is for- Well now you know, it's for a modular IPS card. ... 5
The Register ran a long article to the effect of "A guy tried to engage in pedophile activity and got...