Apple has released iOS 7.1, with an array of visual tweaks, some bug fixes, and an option that lets users turn off the so-called "parallax effect" that creates an illusion of changing perspective, and hence motion, in the radically redesigned user interface.
Each year, hundreds of vendors head to the RSA Conference in San Francisco, California, arguably the largest security gathering in the U.S. For many of those vendors, the show is a requirement, but there's a steep cost involved. For smaller companies, the show can create a sink or swim environment.
Building a Security Operations Center (SOC) from scratch or revamping an underperforming one is a daunting leadership challenge. Of all the tasks you have to think about, finding and hiring a set of SOC analysts with the right skill set has to be a top priority.
In 1993, a few years after immigrating to the U.S., Arkadiy Dobkin, an electrical engineer trained in Minsk, Belarus, started a company that aimed to tap the IT engineering talent developed in the former Soviet Union.
Fraunhofer Institute researchers are working to speed up the scanning of mobile app code for security flaws, aiming to offer developers in a few milliseconds the kind of analysis that once required an all-night scan of code.
Encryption technologies can be a powerful tool against government surveillance, but the most effective techniques are still largely out of reach to the average Internet user, Edward Snowden said Monday.
Oracle is planning to make significant investments in its ERP software for higher education institutions, with an eye on keeping the installed base happy and fending off challenges from the likes of Workday.
"There are four critical questions every enterprise and IT administrator should ask when considering file sharing services," says Adam Gordon, author of "Official (ISC)2 Guide to the CISSP CBK, Third Edition ((ISC)2 Press)." These include: Where will the service store and share files? Who will view the files? How will the service protect the files? And, what types of files will the service permit in the storage system? If a service provider doesn't respond satisfactorily, CISOs should consider their options.
Buying code modules from a curated marketplace can help usher applications into production on time and on budget. Because code marketplaces guarantee that developers will actively maintain modules, concerns about support are largely mitigated.
Serena Software founder Doug Troxel is teaming up with private equity firm HGGC to purchase the application development software vendor from Silver Lake Partners. Terms of the deal, which was announced Monday, were not disclosed.
Recently released security updates for the popular Joomla content management system (CMS) address a SQL injection vulnerability that poses a high risk and can be exploited to extract information from the databases of Joomla-based sites.
A decade ago, Microsoft kicked off SDL, or Security Development Lifecycle, a now-widely-adopted process designed to bake security into software, and began building what has become an unmatched reputation in how a vendor writes more secure code, keeps customers informed about security issues, and backs that up with regular patches.
The hacking of a U.S. military network that was made easier by a poorly written contract with Hewlett-Packard offers lessons on how negotiations between customer and service provider could lead to weakened security.
The Office of the National Coordinator for Health IT is taking incremental steps to make life easier for healthcare providers struggling to meet the criteria for the meaningful use of electronic health record technology. It's welcome relief for overburdened organizations -- but is it enough to meet their demands for improved interoperability?
With the introduction of Office 365 Home Premium last year, Microsoft radically changed the way it delivers Office to consumers. Instead of just offering an Office suite that includes a varied number of applications priced anywhere from $140-$400, the software maker wagered you'd pay $100 per year to get access to all of the Office apps and the right to install them on up to 5 PCs, plus extra Skype minutes and OneDrive storage.
The National Institute of Standards and Technology (NIST) warns that moving from IPv4 to IPv6 is a process fraught with peril, which may explain why government agencies are so far behind their own deadlines for implementation.
The secret Foreign Intelligence Surveillance Court has ruled against a U.S. government request that it be allowed to hold telephone metadata beyond the current five-year limit as it may be required as evidence in civil lawsuits that question the data collection.
Alibaba Group's hold over China's e-commerce market is facing a new challenge from rival Tencent, which is joining forces with a local online retailer to expand in the nation's growing mobile Internet market.
Hackers attacked the personal blog of Mt. Gox CEO Mark Karpeles on Sunday and posted what they claim is a ledger showing a balance of some 950,000 bitcoins based on records they obtained from the defunct exchange for the virtual currency.
Unifying communications by replacing separate PCs and telephones with a PC equipped with a headset and some telephony software can sound like a great idea until the first electricity bill for those always-on PCs comes in. Fujitsu hopes to end that bill shock with an always-on multimedia PC for businesses that features a special power-saving mode.
Protecting privacy was on the minds of almost all the dignitaries assembled in Hanover, Germany, on Sunday night to open this year's Cebit trade show, the theme of which is "datability," or big data with responsibility.
You will notice bigger photos in your Facebook news feed over the coming weeks, but the layout and navigation of the site remain untouched. A massive redesign envisioned by top brass at the company was mostly scrubbed to indulge the lowest common denominator.
The U.S. Federal Communications Commission should move forward with a plan to open up new 5GHz spectrum to Wi-Fi as consumer demand for wireless bandwidth skyrockets, a member of the commission said Friday.
With robots becoming increasingly powerful, intelligent and autonomous, a scientist at Rensselaer Polytechnic Institute says it's time to start making sure they know the difference between good and evil.
Thanks to blockbuster acquisitions such as Facebook's $19 billion purchase of WhatsApp, successful IPOs and a healthy environment for startups, the entrepreneurial spirit is alive again in the Silicon Valley.
The iOSphere overflowed with gratitude for the monumental failure, the colossal collapse, the flop, the fiasco, the disaster of the iPhone 5C because it has finally convinced Apple to give the iPhone 6 a screen larger than four inches.
Last week, Salesforce.com reported its fourth-quarter and year-end fiscal 2014 results, announcing a major bump in revenue and even raising its guidance significantly. But the fast-growing cloud vendor is also continuing to post significant losses as it spends big on sales, marketing and acquisitions.
The first Cebit trade show in the post-Snowden era will focus on security, showing off locally developed bug-proof phones and messaging systems, as well as the ability to protect mobile devices using smartcards.
Automation, virtualization, cloud computing -- these technology trends are transforming the data center and enabling companies to lower costs, increase flexibility and improve reliability. However, these shifts require IT, and their outsourcing providers, to rethink traditional strategies.
Research pointing to rising criminality on Tor shows the cost of having a network that provides anonymity to whistleblowers, journalists, political dissidents and others trying to avoid government surveillance.
Microsoft has launched a new website to "tell the untold story" of something it believes changed the history of Windows security and indeed Microsoft itself a the Software Development Lifecycle or plain 'SDL' for short.
HP was the first IT vendor out of the gate with its analyst-only event. CIO.com columnist Rob Enderle was there to grade HP on five metrics and see how the company stacks up to IBM, EMC and Dell -- all of which know a thing or two about successful industry analyst events.
The U.S. Federal Aviation Administration's policy regarding the commercial use of drones, based on a 2007 policy statement, "cannot be considered as establishing a rule or enforceable regulation," an administrative law judge ruled Thursday.
Newsweek made waves this week with an article that claims to unmask Satoshi Nakamoto, the previously anonymous person whose name was the only one listed on the 2008 whitepaper that launched the modern cryptocurrency movement.
Microsoft will deliver five security updates to customers next week, two tagged as "critical," including one that will quash the open vulnerability in Internet Explorer that hackers have been exploiting since January.
In today's network environments, malware that evades legacy defenses is pervasive, with communication and activity occurring up to once every three minutes. Unfortunately, most of this activity is inconsequential to the business. You would think that would be good news right? The problem is that incident responders have no good way of distinguishing inconsequential malware from (potentially) highly damaging malware. As a result, they spend way too much time and resources chasing red herrings while truly malicious activity slips past.
There are many reasons why The Container Store, a Coppell, Texas-based retailer of storage systems and accessories, has made Fortune Magazine's list of "100 Best Companies to Work For" the past 15 years.
The U.S. Federal Trade Commission should investigate Facebook's proposed US$19 billion acquisition of mobile messaging app WhatsApp -- and possibly block it -- because of the potential impact on users' privacy, two privacy groups said in a complaint filed Thursday.
Strategically leaking information about upcoming smartphones and tablets to the press is a favorite way for manufacturers to create buzz around their products without having to spoil everything in an official reveal. This has been your tech marketing tip of the day, thank you, you've been a lovely audience.
An updated Apple whitepaper on iOS security delves into an unprecedented amount of detail about the security architecture and features of the company's mobile OS for devices such as the iPhone and iPad. Security professionals and IT consultants are praising both the company's transparency and its approach to protecting iOS devices, Internet security and users' data.
Get Daily News by Email
Sign up and receive the latest news, reviews and trends on your favorite technology topics.