AT&T wants to silence a shareholder proposal that it disclose the government requests it receives for customer information, rejecting a step that Google, Microsoft and other Internet companies have already taken.
The U.S. Defense Department may have found a new way to scan millions of lines of software code for vulnerabilities, namely by turning the practice into a set of video games and puzzles and have volunteers do the work.
The U.S. Federal Communications Commission will aim to conduct auctions to sell spectrum now held by television stations to mobile broadband providers in mid-2015, the chairman of the agency said Friday.
An estimated one in four user applications sent from the U.S. Department of Health and Human Services' HealthCare.gov to insurance providers have errors introduced by the website, including missing applications, an official with the agency said Friday.
About a month ago, Samsung reached out to see if I was interested in checking out its latest personal color printer, which happens to be NFC-enabled. I was. The company says the printer it sent, the Xpress C460FW, is the "world's first laser printer with NFC technology." I'm not so sure that's true, because a quick Google search turned up a number of other NFC-enabled printers from Brother and HP. Either way, it's the first NFC printer I've used.
The U.S. National Security Agency has been spying on Italian communications from installations on the roof of the U.S. Embassy in Rome and the country's consulate in Milan and even mounted an operation to capture information from inside the Italian embassy in Washington, D.C., the Italian weekly magazine L'Espresso claimed Friday.
The National Security Agency on Friday cited a 1981 executive order signed by then-President Ronald Reagan as the authority under which it is collecting location data daily from tens of millions of cell phones around the world.
The U.S. Supreme Court has agreed to hear a controversial software patent case after a federal appeals court ruled that an abstract idea is not patentable simply because it is tied to a computer system.
Thirteen people, including the creator of Blackhole, a popular exploit tool used to infect computers with malware, were arrested and charged in Russia with creating and participating in a criminal organization.
IBM is developing software that will allow organizations to use multiple cloud storage services interchangeably, reducing dependence on any single cloud vendor and ensuring that data remains available even during service outages.
U.S. securities regulators questioned an early version of Twitter's initial public offering prospectus that claimed the social media company was becoming more profitable when it was actually losing increasing amounts of money.
An IT specialist working for the U.S. National Science Foundation has pleaded guilty to theft of government property for redirecting more than US$94,000 in government funds for his personal use, the U.S. Department of Justice said.
The rise of virtualization has ushered in dramatic shifts in the computing landscape: Servers are more efficient and users can be more agile. But it's also created new challenges for backup and recovery.
Samsung, Philips and electronics retailer Media-Saturn were among the companies raided by European officials this week as part of an investigation into possible anticompetitive agreements about online sales of electronics.
Where did you first learn about Amazon's crazy plan to deliver packages via drone? "60 Minutes"? The New York Times? Increasingly, the answer is likely to be Twitter, Facebook or Yahoo, and that's just how the online giants like it.
As times change, so does the role of IT. A generation ago, it had to embrace PCs and client/server solutions. Now IT departments are faced with the consumerization of technology. Could the same analytics that helps companies predict customer behavior help IT departments stay relevant?
The Cloud Security Alliance (CSA) is putting forward an innovative encryption-based security architecture for software-defined networks and cloud environments that draws some of its inspiration from high-security networks used by the U.S. Department of Defense and intelligence agencies.
Among the many expectations for IT in 2014, Ethernet is projected to broaden its penetration in the metro area and the WAN. The ubiquitous technology will become further entrenched as a broadband access, cloud interconnect and wide area medium, further distancing itself from legacy TDM services. Here are eight predictions for Ethernet in the New Year, from service provider Comcast Business Services:
Microsoft and law enforcement agencies said Thursday that they disrupted a botnet that defrauded online advertisers of US$2.7 million a month but that the malicious network hasn't been completely eliminated.
Approaches to storing, managing, analyzing and mining Big Data are new, introducing security and privacy challenges within these processes. Big Data transmits and processes an individual's PII as part of a mass of data--millions to trillions of entries--flowing swiftly through new junctions, each with its own vulnerabilities.
Microsoft will ship 11 security updates next week to patch critical vulnerabilities in Windows, Internet Explorer, Office and Exchange, including one meant to stymie active attacks the company confirmed last month.
Some of us spend a lot of time trying to elevate our status in life and accumulate more privileges. Apparently, that's not as difficult as it should be (it should be impossible) in the Windows XP and Server 2003 kernels. With the proper knowledge, you can log on as a restricted user and exploit a vulnerability to gain admin rights and control over everything on the system.
The best thing about driverless cars is that robots don't get distracted. CIO.com senior writer Tom Kaneshige explains why we should pry our fingers from the steering wheel and leave the road to self-driven cars.
Explosive revelations in the past six months about the U.S. government's massive cyber-spying activities have spooked individuals, rankled politicians and enraged privacy watchdogs, but top IT executives aren't panicking -- yet.
The problem with IT security professionals is they spend too much time stopping business people from trying new things, including cloud services, out of worries about risk when they should really be working directly with business managers to help them innovate by means of security.
More powerful processors will allow smartphone vendors to turn their high-end models into gaming consoles, but slower growth will also force them to focus more on improving their less expensive products next year.
The U.S. House of Representatives has passed a bill meant to discourage so-called patent trolls from filing multiple infringement lawsuits or demanding licensing deals over the objections of some groups representing small inventors.
It's been another busy year in the enterprise software industry, marked by high-profile acquisitions and IPOs, the rise of in-memory computing, a red-hot HCM (human capital management) market, and even the apparent settling of a long-running Silicon Valley feud. Here's a look at some of the highlights.
The developer of a popular flashlight app for Android devices has agreed to settle U.S. Federal Trade Commission charges that it shared users' geolocation information with advertising networks and other organizations without permission.
Oracle has fully integrated the long-awaited Linux DTrace debugging tool into the latest release of its Linux distribution, potentially allowing administrators and developers to pinpoint the cause of thorny performance issues with more accuracy.
JPMorgan Chase & Co. has said they plan to issue breach notifications to nearly 500,000 customers, or two percent of the bank's 25 million UCard users, after hackers breached their network in July. However, because there's no evidence that funds were stolen, the bank will not issue replacement cards.
The U.S. government has a huge image problem worldwide as it promotes Internet freedom on one hand and conducts mass surveillance on the other, potentially creating major problems for U.S. technology companies, a former official with President Barack Obama's administration said Thursday.
The majority of today's CIOs see value in mobilizing enterprise applications and in deploying mobile-related innovations such as GPS features, location-based services (LBS), mobile payments and QR codes. Many also say their organizations are already somehow increasing revenue and developing new revenue streams directly related to mobile. But nearly as many CIOs also see the cost of deploying new innovations as prohibitive and complexity as a major concern, according to a new survey commissioned by Mobile Helix, a mobile security vendor.
Almost 2 million stolen website and email login credentials were found on a botnet command-and-control server, with most of the compromised accounts belonging to Facebook, Google, Yahoo, Twitter, LinkedIn and other popular services.
Distributed denial-of-service attacks against financial firms and other industries have been mounting, so today the Cloud Security Alliance (CSA) announced it is establishing the Anti-Bot Working Group to help fight this threat.
You really, really need to dump Windows XP. No, really. Windows XP was great, and many users still love the operating system, but...it's more than a decade old. At the rate technology evolves, that makes Windows XP a near-relic. Although it may still appear to work fine, the mantra of "if it ain't broke, don't fix it" doesn't really apply to Windows XP. It's broken in many ways, and when Microsoft officially stops supporting it next April, it really will be broken.
After a glowing news conference yesterday citing "night and day" progress on HealthCare.gov, I decided to log in this morning and take the Web site for a test drive, as I'm sure many others are doing. Early reports had been promising. What I found was hardly encouraging — long delays loading pages, an endless circle of tasks (some already completed) and ultimately an error message.
The price of bitcoins may be soaring, but China isn't too thrilled with the virtual currency. On Thursday, the nation moved to regulate use of bitcoins, stating that its financial institutions could not deal in the virtual currency.
Organizations drowning in big and small data will soon have a new way to wrangle, munge or transform it – however you want to describe the process – thanks to software from startup Trifacta that's now in beta tests.
German police have arrested two persons they accuse of hacking computers and using them to generate bitcoins police valued at more than a!700,000 (US$954,000). A third suspect was not taken into custody, police said.
Microsoft moved to reassure business and government customers worldwide that it is committed to informing them of legal orders related to their data, and will fight in court any 'gag order' that prevents it from sharing such information with customers.