New Westmere-based server chip range aims at single-core server refresh lifecycles, touting a 15:1 server consolidation ratio and 5-month payback
A new report from the Internet Crime Complaint Centre found the amount of losses from cyber-crime doubled in 2009, with…
A Facebook quiz and local policing feedback board are just two of the ideas that have emerged from a government…
A new self-assessment tool from Jericho Forum aims to establish a baseline for checking the effectiveness of IT security products
Google has received complaints since it expanded its Street View service last week to cover 96 percent of UK roads
Will the takedown of more than 25 percent of the command-and-control servers tied to the Zeus Trojan have a lasting…
Twitter has switched on its long awaited location-sharing feature and made the service opt-in, tagging users' tweets based on where…
Alan Johnson has defended his decision to extradite hacker Gary McKinnon, claiming he needs to "face the music"
Harriet Harman says MPs are "taking action" to make Facebook adopt the UK's CEOP online protection scheme for children -…
Cisco's powerful CRS-3 router will meet rapidly growing demand for bandwidth, according to analysts, but its closest rival, Juniper Networks,…
Facebook is threatening to sue the Daily Mail, after the newspaper published an article suggesting children who used the site…
The RSA conference seeks to use lessons from single-tenant data centres to build security into cloud computing infrastructures. But what…
Twitter has announced it will begin scanning links posted by users to thwart phishing attacks and the spread of malware…
Fasthosts targets UK firms’ growing appetites for virtual server solutions, featuring Hyper-V technology and customisable RAM, CPU and disk space
SOS expands functionality of its Universal Backup solution, including unlimited versioning, archiving and global roaming access
The company warns that attackers are targeting a vulnerability in Internet Explorer that can be used to hijack machines
New lineup of Dell Vostro laptops feature Intel Core i7 processors and high-end M4500 workstation is first to combine Nvidia…
Despite increased automation capabilities, IDC points to a range of data centre approaches that are driving higher management spending
A Trojan hidden within software for the Energizer Duo USB battery charger may have been around since May 2007, according…
Almost a quarter of industry professionals are unable to define cloud computing, but will a new industry forum’s code of…
As the government prepares to launch its Cyber Security Operations Centre, Reed Henry of ArcSight discusses the importance of protecting…
Microsoft is planning two security updates for Patch Tuesday to address eight vulnerabilities, and reminded users it is terminating support…
Files stored in Google Docs or in Gmail are broken up into digital pieces and stored on random servers for…
The details of a Russian botnet that targets Russian banks instead of Western victims has been revealed at the RSA…
A security researcher believes that the Chinese hackers responsible for the Google attack managed to steal valuable source code
Greenpeace has admitted that its hosting operations are powered by coal and nuclear power, after it criticised Facebook for building…
The ICO has released a new report which includes tools to help enterprises argue a business case for data protection
Former US Secretary of Homeland Security Michael Chertoff and former Bush administration cyber-security advisor Richard Clarke laid out the privacy…
Sophos security expert Graham Cluley outlined some of the main threats targeting Facebook, Twitter and other social networking sites