eWeek

Why Airbnb Users And Hosts Must Beware Of WiFi Risks

At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be…

8 years ago

Black Hat USA and DefCon: Finding Security Risks in All the Things

PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security

8 years ago

Apple Q3 Revenue Down 15% As iPhone Sales Drop Again

Apple's Q3 revenue fell to $42.36B and its net income fell to $7.8B as iPhone sales dropped for the second…

8 years ago

DNC Email Scandal Shows What Must Be Done to Prevent Breaches, Leaks

ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the…

8 years ago

Blockchain Moving Beyond Finance; Still in Early Stages

Blockchain is attracting huge interest from financial sector - but it's not the only area that can benefit

8 years ago

Why BlackBerry CEO Chen Doesn’t Worry About Smartphone Market Share

In a Q&A with reporters, BlackBerry's John Chen explained why the company doesn't have to be a big player in…

8 years ago

Oracle Issues Its Largest Patch Update Ever

Oracle's July Critical Patch update fixes 276 different vulnerabilities. Will 200-plus flaws be typical for future updates?

8 years ago

Pokemon Go To Add Location Ad Sponsorship In The Ultra-Popular Game

ANALYSIS: Businesses that want to be featured in Pokémon GO will now be able to pay to sponsor the locations…

8 years ago

Cisco Brings More Security to Its Networking DNA

Cisco Live 2016: Cisco shows off new offerings designed to make it easier for enterprises to address increasing security threats

8 years ago

Firmware Flaw Affects Lenovo ThinkPads, Other PC Makers’ Hardware

ANALYSIS: New zero-day vulnerability may also affect computers from other makers that used similar Intel UEFI reference code to create…

8 years ago

Will Differential Privacy Give Data-Focused Firms Both Security and Privacy?

Apple will use differential privacy to collect data on groups while keeping individuals anonymous. This emphasises privacy, while giving access…

8 years ago

Blindspotter Uses Machine Learning To Find Suspicious Network Activity

The use of machine learning to identify suspicious online activity is a new and important capability in securing the network,…

8 years ago

Democratizing Docker: Changing Containers’ Competitive Landscape

ANALYSIS: Some new capabilities landed inside Docker that could create partner friction and more competition if not handled properly

8 years ago

Docker Container Usage Growing

A trio of new reports show positive trends for Docker container adoption, despite concerns Docker too complex to integrate into…

8 years ago

Microsoft’s Cloud to Track Legalized Marijuana Sales

Microsoft teams with Kind Financial to help government agencies track the legalized cannabis industry in their jurisdictions.

8 years ago

Cisco Creates £8m Cyber-Security Scholarship Program

The scholarship program and improved certifications are aimed at growing the number of skilled cyber-security experts, officials say

8 years ago

IBM Enhances Support For The Swift Programming Language

At WWDC, IBM extended its already-considerable support for the Swift programming language, particularly for using Swift for server-side development

8 years ago

Microsoft-LinkedIn Deal May Prove Better Fit Than Earlier Buyouts

ANALYSIS: Although more consumers use Microsoft products, enterprises are its most important customers, and owning LinkedIn can help deepen their…

8 years ago

Lessons From Mark Zuckerberg’s Social Networking Account Breach

ANALYSIS: Facebook founder and CEO Mark Zuckerberg made a mistake that many, perhaps most, people make and reused passwords for…

8 years ago

Dell Brings Water-Cooling System to Hyperscale Data Centers

The company is collaborating with Intel to develop the Triton solution, which is aimed at scale-out data center environments.

8 years ago

CoreOS Launches Torus Project for Cloud-Native Storage

While there are already multiple distributed storage systems, Torus aims to be cloud-native and integrate closely with Kubernetes.

8 years ago

Web Publishers Need To Address Reasons Why Readers Install Ad Blockers

ANALYSIS: Newspapers and Web sites of all kinds are fighting the use of ad blockers as a threat to their…

8 years ago

Windows 10 Preview Build Streamlines Pro-To-Enterprise Upgrades

Users no longer have to reboot their systems if they want to upgrade their PCs from Windows 10 Pro to…

8 years ago

What Google’s Victory In Java Case Signifies To The IT World

ANALYSIS: Following court loss to Google over Java and the exit of a key Linux thought leader, Oracle must regain…

8 years ago

SAP Counting On Customers To Go All-In On Cloud Migration With HANA

ANALYSIS: SAP is counting on its HANA in-memory database to help retain established customers

8 years ago

Security For Google’s New Home Assistant May Get Lost On The IoT

GOOGLE I/O 2016 ANALYSIS: Nobody knows what security is planned for Google Home smart assistant, but buyers need to think…

8 years ago

Why VCs Have Invested More Than $200M in Container Tech

ANALYSIS: Last week alone, investors—aiming to profit from the new approach to building, deploying and managing apps—poured $63M into container…

8 years ago

Apple Updates OS X 10.11.4 And iOS 9.3 To Boost Security

Among the security updates is a critical vulnerability in Apple's Messages app that could have exposed users to risk

8 years ago

Mozilla Firefox 45 Removes Tab Groups, Provides Security Updates

Mozilla provides 21 security advisories for its Firefox 45 browser. New features in the browser include improvements to the Firefox…

9 years ago

Aruba Shows Off HPE Integration With New Networking Offerings

At Aruba's user conference, officials unveil a range of integrated wired and wireless that take advantage of the best of…

9 years ago