The modern flexible worker is more demanding than ever, says Mark Dixon. He's just overhauled the technology in his chain…
Apple pushed out its iPhone OS 3.1 software and the accompanying SDK for developers early 1 July, according to reports
A major new deployment of energy efficient thin client computers complements campus green-building design features as part of an environmental…
Mozilla adds new privacy features to the latest version of Firefox in response to features in Internet Explorer 8, Apple…
Cisco chief John Chambers has pointed to new sectors it will either enter or grow in, bringing it into even…
A Trojan which stole 88,000 FTP credentials may have been in action for more than two years, say researchers
The Chinese Government's plan to require Green Dam Internet filtering software on all new PCs has been delayed indefinitely
A report from research firm Infonetics predicts software-as-a-service (SaaS) is the future of managed network security.
The Swedish software firm buying Pirate Bay plans to use its brand together with new file-sharing technology to create a…
Microsoft plans to roll out two new data centres in Dublin and Chicago in July, preparing for increased demand for…
Sun Microsystems and RingCube are joining forces to offer Sun Ray users more options when deploying a desktop virtualisation environment.
A new Conservative think tank report is calling for citizen-centric, open source IT development to put an end to wasteful,…
A Webroot survey has found those using social networks such as MySpace and Facebook are not doing enough to protect…
An approved list of apps, or whitelist, is flavour of the month in security. But vendors and alanlysts question whether…
A Researcher at IBM has found an encryption method that lets you operate on data without decrypting it: good news…
Many companies are not able to deploy separate backup data centre locations to provide the complete data-recovery system, relying instead…
Britain's new Cyber Security Minister admits to counter-attack capability, and is accused of stealing President Obama's ideas, and eroding liberties
Plans for the Cyber Command come a month after President Obama declared cyber-security a "national security priority" in a speech
Morro - now known as Windows Security Essentials - is a security update, and yet another admission from Microsoft that…
Technology executives praised the president's cyber-security strategy. But they liked Bush's recipe too: what has Obama cooked up?
Stolen laptops had unencrypted personal data - and Manchester City Council's response may not be enough
But the organisation says it won't ban the download of important data onto mobile devices but ensure that only "essential…
According to Gartner, some of the growth was due to increased demand for appliance-based products
Nine out ten companies say they have no plans to cut back on their IT headcount despite making redundancies in…
China has begun blocking Chinese-language search engine results deemed pornographic and is calling on Google to do more to combat…
The free product represents Microsoft's latest swing at the consumer security market, which is dominated by vendors such as Symantec…
The Web is a dangerous place, but if you try to keep your employees off it, you'll only make things…
Researchers at Websense uncover a mass compromise of legitimate sites in an attack called Nine-Ball that is redirecting users to…
While PC makers were told the software must be included with all PCs sold in China, the Chinese government is…
The UK government's proposed crackdown on ilegal copying could make a perfect test of the music industry's assumptions, says Peter…