The majority of today's CIOs see value in mobilizing enterprise applications and in deploying mobile-related innovations such as GPS features, location-based services (LBS), mobile payments and QR codes. Many also say their organizations are already somehow increasing revenue and developing new revenue streams directly related to mobile. But nearly as many CIOs also see the cost of deploying new innovations as prohibitive and complexity as a major concern, according to a new survey commissioned by Mobile Helix, a mobile security vendor.
Almost 2 million stolen website and email login credentials were found on a botnet command-and-control server, with most of the compromised accounts belonging to Facebook, Google, Yahoo, Twitter, LinkedIn and other popular services.
Distributed denial-of-service attacks against financial firms and other industries have been mounting, so today the Cloud Security Alliance (CSA) announced it is establishing the Anti-Bot Working Group to help fight this threat.
You really, really need to dump Windows XP. No, really. Windows XP was great, and many users still love the operating system, but...it's more than a decade old. At the rate technology evolves, that makes Windows XP a near-relic. Although it may still appear to work fine, the mantra of "if it ain't broke, don't fix it" doesn't really apply to Windows XP. It's broken in many ways, and when Microsoft officially stops supporting it next April, it really will be broken.
After a glowing news conference yesterday citing "night and day" progress on HealthCare.gov, I decided to log in this morning and take the Web site for a test drive, as I'm sure many others are doing. Early reports had been promising. What I found was hardly encouraging — long delays loading pages, an endless circle of tasks (some already completed) and ultimately an error message.
The price of bitcoins may be soaring, but China isn't too thrilled with the virtual currency. On Thursday, the nation moved to regulate use of bitcoins, stating that its financial institutions could not deal in the virtual currency.
Organizations drowning in big and small data will soon have a new way to wrangle, munge or transform it – however you want to describe the process – thanks to software from startup Trifacta that's now in beta tests.
German police have arrested two persons they accuse of hacking computers and using them to generate bitcoins police valued at more than a!700,000 (US$954,000). A third suspect was not taken into custody, police said.
Microsoft moved to reassure business and government customers worldwide that it is committed to informing them of legal orders related to their data, and will fight in court any 'gag order' that prevents it from sharing such information with customers.
The holiday season is officially underway. Your good cheer could quickly turn sour, though, if you don't secure your browser before shopping online. Research from Qualys found that almost 40 percent of all browsers have critical vulnerabilities that could enable cyber criminals access to your personal data.
The U.S. is collecting nearly 5 billion records a day on the location of cellphones around the world to feed a large database of the location of "at least hundreds of millions of devices," according to a newspaper report.
Hewlett-Packard took back its server crown from IBM last quarter as the overall market contracted and Taiwanese vendors made big gains selling directly to Internet giants like Google and Facebook, IDC reported Wednesday.
The top product results in Google's Shopping service frequently feature products with higher prices than those listed on competing online shopping services, according to a complaint filed by longtime Google critic Consumer Watchdog.
Everybody knows, or ought to know, about the risks of being hacked. But it's easy to slip into a level of denial about an amorphous threat and get careless if you don't think anybody is out specifically to get you.
Recognizing the growing popularity of Node.js for building distributed Web applications, cloud provider Joyent will soon offer a commercial support package for managing the platform, wherever it is run.
Microsoft today pushed back once again against the idea that it's giving the National Security Agency (NSA) carte blanche access to its cloud-based services, an allegation that's cropped up in media reports since the revelations from former NSA contractor Edward Snowden began last June.
A congressional hearing Wednesday on the botched rollout of HealthCare.gov was largely a forum for Republican critics of U.S. government involvement in the health-care industry and other large social programs.
Once upon a time, not so long ago, the IT admin chose exactly what hardware and software would be used by employees. Recent trends like the consumerization of IT and BYOD (bring your own device) have shifted the balance of power, but IT still has to maintain some degree of control over the applications used and where sensitive data is stored. Many users just download apps or start using unsanctioned services, though, and introduce unnceccesary security risks through "shadow IT."
Once upon a time some Carnegie Mellon University researchers came up with a scheme to use stories and pictures to help users live happily ever after by creating and remembering dozens of passwords – and avoiding use of the exact same passwords for multiple sites.
First came the closure of criminal underground Silk Road, now an apparently vast theft of Bitcoins from one of the sites that replaced it, Sheep Marketplace. Are the users of darkweb markets now being targeted by criminals?
Many enterprises use and like SharePoint. Microsoft likes it, too, because it's one of the company's fastest-growing product lines. But making enterprises support separate cloud and on-premises versions and telling SharePoint app developers not to work in C# and ASP.NET may make for a rocky relationship as time goes by.
Apple's iPhone could be getting a step closer to being officially offered on China's largest mobile network, after the nation's government finally issued 4G licenses to operate LTE TDD networks in the country.
Touch-ready notebook PCs will account for about 11% of all laptops shipped this year, an improvement over 2012 when customers had few choices if they wanted to smudge screens, a market research analyst said today.
File-hosting website Hotfile has agreed to pay US$80 million in damages and was also ordered to stop operations unless it uses copyright filtering technologies that prevent infringement of the works of studios, the Motion Picture Association of America said Tuesday.
When end users circumvent the IT department and start using software-as-a-service (SaaS) applications without permission, the IT pros complain about the plague they call "shadow IT." But it would seem the professionals are also operating in the shadows, according to a survey out today.
While China's demand for electronics continues to soar, the tech services market may be shrinking for U.S. enterprise vendors. Security concerns over U.S. secret surveillance are giving the Chinese government and local companies more reason to trust domestic vendors, according to industry experts.
North Korea is likely to escalate its cyberattacks on South Korea in the coming years in an effort to convince its southern neighbor to back off demands to limit its nuclear program, a Korea expert predicted.
The U.S. House of Representatives needs to take more time to debate and rewrite a bill targeting so-called patent trolls because several provisions would hurt legitimate patent holders, several critics of the bill said Tuesday.
Building on a collaboration with Google, software vendor JetBrains has updated its IntelliJ IDEA Java IDE (integrated development environment) to offer more capabilities for creating applications to run on Android devices.
With news this week that Google Compute Engine cloud is now generally available, the battle in the Infrastructure-as-a-Service market has hit a new level. The biggest question is: Can Google give the kingpin of the public IaaS market, Amazon Web Services (AWS), a run for its money?
Security researches are gradually raising warnings that the Internet of Things will increase, by multitudes, the number of things that can be hacked and attacked. The Hitchcockian plotlines are endless.
In a development likely to concern those who believe that a system that's not connected to a network is safe from surveillance, researchers have demonstrated that microphones and speakers built into laptops can be used to covertly transmit and receive data through inaudible audio signals
Online shopping trends point to lots of people, particularly men, using their smartphones and tablets to buy holiday presents. Since some of that browsing and buying will occur at work, experts say companies would be wise to give employees the following eight tips to protect themselves and corporate data.
It's the end of the line for one of the frontrunners in the solid-state drive revolution: Toshiba is buying OCZ's SSD assets for the bargain bin price of $35 million, mere days after OCZ declared bankruptcy last Friday.
Nokia has won a sales ban on the HTC One Mini smartphone in the U.K., but its Taiwanese rival can keep on selling its HTC One flagship model pending the outcome of a possible appeal, the England and Wales High Court ruled Tuesday.
Red Hat has released the second version of its OpenShift Enterprise platform as a service (PaaS), which comes with tools that make it easier to deploy, and provide integration with more hardware options and programming languages. It also is the latest move in the busy PaaS market, which is quickly gaining steam to catch up in importance to the more established IaaS and SaaS markets.
Just a few years back, buying a laptop was as easy as walking into a Wal-Mart or Best Buy, strolling past the netbooks, plunking down a few hundred bucks on a Windows machine with a trackpad that didn't completely suck, and coming home, if not happy, at least with a notebook that could get the job done.
Mobile operators looking for somewhere to place small base stations to improve network performance in metropolitan areas can now turn to Alcatel-Lucent, which has set up a clearing house for information about available sites.
Apple is seeking to bar Samsung Electronics executives with knowledge of leaked confidential information from negotiating any mobile device licenses for the South Korean company for the next two years.