Apple iOS Apps Leak More Personal Info Than Android
Free iPhone and iPad apps from Apple's App Store pose a greater privacy risk than free apps from Google Play. That's the finding of the latest study by Appthority, which is in the business of...
View ArticleThe 9 Top Threats Facing Cloud Computing
Cybercriminals and the mayhem they can cause have become the leading concern of security experts in cloud computing. That's the takeaway from the Cloud Security Alliance's latest poll on the top nine...
View ArticleIBM Makes OpenStack The Cloud Platform To Beat
With IBM tossing its might behind OpenStack, the open source software used to run cloud-computing installations is in a strong position to become the dominant platform in the industry. OpenStack Rising...
View ArticleAT&T/Verizon Challenge Tech Companies' Commitment To National Security
The technology industry has been excluded from the government's definition of what constitutes the nation's critical infrastructure, giving them a free pass from regulations. While this may be good for...
View ArticlePay-As-You-Read E-Bookselling Won't Make It Off The Shelves
Entrepreneurs have often used technology to bring us services we didn't even know we needed. Who would have thought a billion people would be willing to share their lives on Facebook and hundreds of...
View ArticleWhose Fault Is It When Your PC Gets Hacked? Probably Not Microsoft's
Since 2002, when Microsoft launched its Trustworthy Computing initiative, security in the company's products have improved each year. But while the company has increasingly battened down Windows,...
View ArticleThe Enterprise Tablet Party Is Over For Apple
In 2010, Apple captivated PC users with the release of the iPad. The thin and light tablet with exceptional battery life, ease of use and attractive design became the must-have mobile device for many...
View ArticleNo More Wild West For Bring Your Own Devices
In June 2007, Apple launched the first iPhone, marking a new era in corporate mobility. Before the fashionable mini-computer, people used smartphones for voice, texting and email. With the iPhone and...
View ArticleWhy Intel TV Is Just Another Doomed Lunge At The Consumer Market
Over the past dozen years or so, Intel has repeatedly demonstrated that it has a tin ear when it comes to consumer electronics. Despite a long trail of failure, the tenacious chipmaker keeps coming...
View ArticleEMC & VMware Vs. Amazon: The Empire Strikes Back
Amazon Web Services is on fire, and EMC and VMware are feeling the heat. So the established enterprise-computing duo is striking back — by launching Pivotal, a joint venture that aims specifically to...
View ArticleMany Free Android Apps Are Starting To Look A Lot Like Malware
The money-go-round between app developers and ad networks is starting to blur the line between many free Android apps and malware. While these legitimate apps aren't stealing passwords, they're still...
View ArticleWould You Talk To An Ad On Your Smartphone?
Just looking at ads is bad enough, so who would want to talk to them? While many people would likely answer "no one," voice-recognition software maker Nuance says the opposite is true. What Is A Voice...
View ArticleYour Next Big Security Headache: Your Wireless Router
You've installed antivirus software on your computers, configured your operating system to update its security automatically and password-protected your Wi-Fi. So your home network is safe against...
View ArticleHey, The FTC Might Finally Break The Carriers' Android-Update Logjam
The federal government appears ready to take dramatic action against U.S. wireless carriers that fail to protect Android smartphone buyers against malware — specifically by not pushing out timely...
View ArticleWhy IBM Should Dump Its Low-End Server Business On Lenovo
IBM has no stomach for low-margin businesses, which is why Big Blue may be ready to dump its commodity server business — i.e., servers that run on Intel-compatible "x86" processors. If the reported...
View ArticleHow Hackers Steal Trade Secrets By Targeting Smaller Companies
Cyberespionage is usually considered a threat to government agencies and large corporations such as defense contractors and banks. But a new Verizon report on data breaches finds that cyberspies are...
View ArticleWhy Security Holes In Critical Infrastructure Are So Darn Hard To Fix
Security researchers recently found gaping vulnerabilities in a wide variety of critical business and industrial equipment. It turns out that weak or absent passwords made it easy to break into more...
View ArticleThe Smart TV Is Dead. Long Live The Second Screen
People want their television to work like a TV. Sending tweets on Twitter, posting photos on Facebook and browsing the Web are best left to smartphones and tablets. Indeed, more than 40% of U.S....
View ArticleBeware: We May Be Entering The Age Of Cybersabotage
Low-level cyberscuffles between nations may be about to escalate into more serious conflicts. U.S. government officials are reporting a new wave of attacks aimed at sabotage within the U.S.,...
View ArticleSorry Intel: Your Next-Gen Haswell Chip Won't Rescue The PC Market
On Tuesday, Intel will formally launch Haswell, the fourth-generation Core processor the company says will help pull the PC industry out of its downward spiral. Unfortunately for PC makers, that won't...
View Article
More Pages to Explore .....