Scientists at Sandia National Laboratories have demonstrated the ability to run more than 1 million Linux kernels as virtual machines,…
Authentec, like competitor Upek, is thinking of new ways to revive the authentication market
The Panasonic Toughbook 19, Toughbook 30 and Toughbook U1 mobile computers now meet more demanding military specifications for drops, vibration…
Twitter experiences another distributed-denial-of-service attack, knocking out the microblogging service for a time
USAA, a private bank and insurer in the US, is updating its Apple iPhone app so account holders can simply…
Increasing reliance on IT systems combined with concern about their effectiveness could force governments to more tightly regulate the sector…
Military authorities have outlined how service personnel should use social networks while the US appears to have taken a stricter…
The fallout from the DDOS attack that hit Twitter, Facebook, YouTube and other Web 2.0 sites continued even after the…
Is it finally time for the company to admit that its operating system is as susceptible to security issues as…
Security experts point out that the attack conicided with the first anniversary of escalation of the conflict in South Ossetia
President Mahmoud Ahmadinejad was sworn in shortly before an online tool used by his opponents suffered a DDOS attack. Users…
Legislation would carve out an exception to a national law that outlaws wireless jamming devices, allowing such wireless jamming devices…
Security researchers released details today about vulnerabilities in XML libraries from Sun Microsystems, Python and Apache
The order comes a day after the U.S. Marine Corps issued a ban on the use of Facebook, Twitter and…
While US authorities are keen to extradite the British hacker, its military has publicly admitted to trying to hire recruits…
The incident in Liverpool follows similar cases reported in the US recently
Apple has swatted a bug in the iPhone that security researchers Charlie Miller and Collin Mulliner spotlighted at the Black…
Mozilla Firefox, the open-source challenger to Microsoft's Internet Explorer, passed the 1-billion download mark on 31 July, with a Website…
Supporters say the eccentric UFO hunter who hacked NASA and Department of Defense systems won't get a fair trial in…
The Home Office is now talking less about counter-terrorism and more about easing travel in Europe
In a response filed with the U.S. Copyright Office, Apple claims jailbreaking, or unlocking, its iPhone smartphone could lead to…
The Nokia-backed operating system is a fertile ground for malware - and most users don't realise
Germany becomes most spammed country thanks in part to translation software, says MessageLabs
Google's poor privacy record makes it the last place to put private data, says Tory shadow home secretary turned civil…
Microsoft will release two out-of-band security bulletins tomorrow, targeting issues in Internet Explorer and the Visual Studio product line
The IT Effectiveness Index Mid-Year Report has found small-to-medium-sized businesses with failing IT are at a competitive disadvantage
People who believe the cloud is not secure enough are missing the point, says Peter Judge. If the MoD can…
Monopoly ISP operates "Kang-Karoo Court" and punishes users beyond the demands of the music industry
Microsoft Security Essentials (née Morro) is an effective yet modest measure by Microsoft to augment the minimum level of security…
Don Reisinger advocates maintaining your perspective and an open mind to employee use of Web 2.0 with his ten top…