An analysis of satellite communication gear from more than a half-dozen major manufacturers has uncovered critical vulnerabilities that could be exploited to disrupt military operations and ship and aircraft communications.
Borrowing a page from the recently revised Microsoft playbook, development tools maker Telerik has released as open source the bulk of its Kendo software library of components for building Web and mobile applications
Although Exadata is Oracle's most popular and mature "engineered system," some customers implementing the database machine are making mistakes that prevent them from getting the most performance out of the expensive product, according to a veteran of many Exadata projects.
The U.S. Federal Communications Commission will reserve a significant amount of spectrum in its upcoming auctions of the television band for unlicensed uses such as Wi-Fi, agency officials said Friday.
Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.
Americans are optimistic about scientific inventions on the horizon, though are cautious about future uses of DNA, robots, drones and always-on implants, according to the latest Pew Research Center survey on future technology.
A Google complaint against Apple-backed patent consortium Rockstar will stay in a California court rather than be moved to Texas where Rockstar already has patent lawsuits against Google's Android partners, the California court ordered Thursday.
Alibaba's Tmall and Taobao sites already sell everything from clothes and furniture to car tires and medicines. But soon they'll also be offering 3G data and voice call plans as well, the Chinese e-commerce giant said Thursday.
About 2.6 million payment cards at Michaels Stores and another 400,000 at subsidiary Aaron Brothers may have been affected in a card skimming attack that compromised its point-of-sale systems, the retailer said Thursday.
Five music labels have filed a lawsuit against streaming music service Pandora Music, saying the company is violating state law by refusing to pay labels and artists for its use of recordings made before 1972.
For Americans used to roughly 10Mbps broadband connections, the idea of gigabit Internet can feel a little like science fiction. Streaming 4K video without hiccups? Enormous file downloads happening in seconds? Oh, sure.
The Stuxnet malware known to have stealthily targeted Iranian nuclear facilities a few years ago was a wake-up call about how vulnerable critical industrial systems can be to cyberattack. Now, an Israeli start-up, with help from General Electric, is testing security technology that would detect Stuxnet-like attacks on critical infrastructure systems used for power production.
Between the federal Healthcare.gov site and various state websites, more than 7.5 million Americans signed up for 2014 healthcare coverage on a health insurance exchange. Building those exchanges proved to be much, much easier said than done. Here's a quick look at who succeeded and who failed.
Heartbleed has dominated tech headlines for a week now. News outlets, citizen bloggers, and even late-night TV hosts have jumped on the story, each amping up the alarm a little more than the last one. But while it's true Heartbleed is a critical flaw with widespread implications, several security experts we've spoken with believe the sky-is-falling tone of the reporting is a bit melodramatic.
Forget bad headlines generated by the Heartbleed flaw, when it comes to code defects open source is still well ahead of proprietary software, generating fewer coding defects for every size of project, according to a new analysis by scanning service Coverity.
Fifty billion devices will connect to the Internet in the next few years. It's up to vendors to make sure they do, in fact, connect to the Internet -- and provide reliable data, security and customer experience. Otherwise, analysts warn, the future may bring an Internet of Broken Things.
Cybercriminals have started using a sophisticated Android Trojan app designed for e-banking fraud to target Facebook users, possibly in an attempt to bypass the two-factor authentication protection on the social network.
Microsoft on Wednesday extended the Windows 8.1 Update migration deadline for businesses by three months, but again told consumers they had less than four weeks to make the move before the company shuts off their patch faucet.
Microsoft may have retired Windows XP, but one of China's leading security vendors is trying to keep the OS threat-free, and rolling out protection software to hundreds of millions of users in the nation.
Just down the street from a cluster of venture capital firms on Silicon Valley's Sand Hill Road is the SLAC National Accelerator Laboratory, a sprawling, 426-acre site where researchers are pushing the boundaries in physics, chemistry and materials science.
Ahead of the big New York Auto Show, several car companies today displayed in-vehicle infotainment systems that connect to smartphones to use mobile apps, music playlists, calling features and calendars.
Users of Google's Chrome continue to badger the company to change the browser's new tab page, a sore spot to some for over half a year, even as the Mountain View, Calif. firm sticks to its design guns.
Socially-engineered malware tries to trick users into downloading and executing malicious code through tactics that include everything from fake antivirus to fake utilities to fake upgrades to the operating system and trojanized applications. NSS Labs tested several endpoint security products to see how well each would block these attacks.
The amount of electronic information (e.g., documents, images, emails, videos) organizations produce is staggering. Storing all your digital data in your data center can be expensive. That's why cloud storage -- which often comes at a fraction of the cost of storing the information on-premises -- has become increasingly popular.
Many U.S. residents who have written the FCC to voice concerns about the move from copper-based telephone networks to Internet Protocol are concerned about the potential effects on health from mobile-headset radiation and what happens when the electricity goes out.
The transition from copper-based telephone systems to IP networks in the U.S. could become swept up in political fallout as the FCC figures out how to regulate such networks in ways that will appease the courts.
Timothy Youngblood, CISSP, has joined Kimberly Clark as their Chief Information Security Officer. Kimberly Clark is multi-national brand conglomerate with staple consumer products such as Kleenex, Pull-ups, and Scotts Towels.
Oracle has issued a comprehensive list of its software that may or may not be affected by the OpenSSL (secure sockets layer) vulnerability known as Heartbleed, while warning that no fixes are yet available for some likely affected products.
Just days before Microsoft retired Windows XP from public support, the company drastically reduced the price of custom support agreements that give large companies and government agencies another year of XP patches, experts reported today.
On Wednesday, the Ponemon Institute released the results of a new study conducted for DB Networks. In it, 65 percent of the respondents said that they've experienced one or more SQL Injection attacks in the last 12 months. In addition, each incident took an average of 140 days to discover, and 68 days to fix the issue.
Telecom operator TelefA3nica has launched the first mobile ad-exchange platform to use the operator's customer demographics and real-time location data to serve targeted mobile ads, the company said on Wednesday.
In case it wasn't clear already, Intel and Microsoft are no longer joined at the hip. Intel is trying desperately to grow its share of the tablet market, and with Windows flunking out on those devices, Android is where it's at.