- Welcome Guest
- Sign In
Like cats and mice, security product vendors and cyber-criminals do not care much for each other. Over the past 24 hours, however, cyber-criminals may have just about fallen in love with Symantec, which made a mistake that let crooks launch a flood of malware on the Internet. It all began when Syman...
The next five years or so will spell big trouble for data centers. About 46 percent of more than 150 IT professionals and executives surveyed earlier this year by the Business Performance Management Forum said they're running out of space, power and cooling infrastructure for their data centers. In ...
Yahoo wants to tie all its various services together so each user needs to log in just once to access and manage its services, and will be able to do so from one central site. To do this, it is rewiring its architecture from the inside out and opening up its platform to third-party developers, Yahoo...
Microsoft may reconsider its decision to pull Windows XP off the shelves in June if it sees enough customer demand, CEO Steve Ballmer said -- despite a huge customer outcry over the decision. Speaking at Louvain-La-Neuve University in Belgium, Ballmer also said it's a "statistical truth" that most p...
When UC Berkeley journalism graduate student James Karl Buck was grabbed by police in the Egyptian industrial city of Mahalla El-Kobra while photographing a noisy demonstration, he sent a one-word text message to Twitter: "Arrested." That eventually got him out of jail. His Twitter followers -- frie...
Think having a credit or debit card with your photo on it is cool? Well, how about a card the same size and thickness as a credit card, with a window that shows a passcode, and with a public key infrastructure chip on it? When you need to use the card, press on its switch and the PKI chip will run a...
Passwords are not the best of security solutions, as enterprises and individual users have found over the years. They can be cracked or stolen, and not necessarily by high-tech means either. Often, passwords created by end users in corporations are simple, being based on numbers significant to them:...
In a bid to avoid the bitter battles that have raged around third-generation wireless technology, owners of the patents on which the fourth-generation LTE wireless technology is built have agreed to charge each other "reasonable" license fees. The Magnificent Seven are Nokia, the world's largest han...
As corporations implement compliance with various regulations such as Sarbanes-Oxley, they find that they end up with different zones within their network that can't talk to each other. This makes it difficult to implement an enterprise security solution. Adding virtualization to the mix complicates...
The face of online security will change drastically, Jim Bidzos, founder and chairman of trusted certificates vendor VeriSign, said in a keynote speech on Wednesday at the RSA Security Conference in San Francisco. "In the '70s in enterprises, there were mainly mainframes. The Internet, due to good w...
How do you respond when hit by a cyber attack tsunami? That's the question Cyber Storm II, the most comprehensive cyber exercise ever held in the U.S., was designed to answer. Forty private sector companies, 11 Cabinet-level agencies, 10 states and five countries were involved in the March exercise,...
After working for years to prevent cyberterrorist attacks on the U.S., the Department of Homeland Security has approached the private sector for help. At a talk given to information security professionals at the RSA Security Conference, Homeland Security Secretary Michael Chertoff warned that a cybe...
Microsoft has unveiled the public beta of its Forefront enterprise security product, known as "Stirling." This is a single product that delivers coordinated protection across desktop and server applications and the network edge. It comes with a single dashboard that shows all the systems protected b...
Archer Technologies on Tuesday launched the Archer Exchange, a virtual marketplace for on-demand application development wherein companies that have developed applications in-house can put them up on the exchange for sale to other corporations. The company made the announcement at the RSA Security C...
The federal government should step in and pass laws to ensure computer security, the CEO of Symantec told a security conference Tuesday. In the last six months of 2007, nearly 50 million people worldwide were the victims of identity theft, and 70 percent of the most common malicious code used in att...
Secure Web gateway products vendor Finjan unveiled version 9.0 of its Vital Security Web appliance on Monday at the RSA Security Conference. This includes a new active real-time inspection technology that checks both inbound and outbound Web traffic and SSL traffic for malicious content to provide e...
It's quiet on the streets of San Francisco today, the first day of the RSA Security Conference, being held at the Moscone Convention Center south of Market Street. Traffic on the streets is light, so either the cops are doing a good job redirecting the crazy San Francisco traffic, which in this area...
Intel on Wednesday unveiled the Centrino Atom family of low-power processors for mobile Internet devices. It also announced a new class of inexpensive, simple Internet-centric computers, called "netbooks," which will hit the market later this year, and new developments in other chip families. The ce...
AT&T will launch AT&T Mobile TV on Qualcomm's MediaFLO in May. The service will be available on two new handsets available exclusively at AT&T, the LG Vu and the Samsung Access. AT&T Mobile TV will offer full-length TV content and sporting events from CBS Mobile, Comedy Central, ESPN...
Having induced the Federal Communications Commission to open up the C block of wireless spectrum at the recent wireless auction, Google is now seeking access to another set of airwaves in pursuit of openness. This time, it wants to open up the unlicensed parts of the TV broadcast spectrum, the so-ca...
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/antitrust-law.jpg
https://www.technewsworld.com/story/courts-regulators-pose-threat-to-apple-services-revenue-in-2024-178918.html
Courts, Regulators Pose Threat To Apple Services Revenue in 2024
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/02/filmmaker.jpg
https://www.technewsworld.com/story/openais-sora-elevenlabs-and-the-end-of-video-media-as-we-know-it-179032.html
OpenAI’s Sora, ElevenLabs, and the End of Video Media as We Know It
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/03/AI-chip.jpg
https://www.technewsworld.com/story/will-ai-enabled-processors-spark-a-pc-supercycle-this-year-179151.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/05/developer-happy.jpg
https://www.technewsworld.com/story/post-open-licensing-could-offer-software-devs-funding-alternatives-177371.html
Post-Open Licensing Could Offer Software Devs Funding Alternatives
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/weak-password.jpg
https://www.technewsworld.com/story/brute-force-password-cracking-takes-longer-but-celebration-may-be-premature-179146.html
Brute Force Password Cracking Takes Longer, But Celebration May Be Premature
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/09/passwordless-computing.jpg
https://www.technewsworld.com/story/the-realities-of-switching-to-a-passwordless-computing-future-178579.html
The Realities of Switching to a Passwordless Computing Future
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/computer-programmers.jpg
https://www.technewsworld.com/story/ai-will-have-a-transformative-impact-on-software-development-in-2024-178950.html
AI Will Have a Transformative Impact on Software Development in 2024
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/AI-content-generation.jpg
https://www.technewsworld.com/story/copyleaks-study-finds-explosive-growth-of-ai-content-on-the-web-179161.html
Copyleaks Study Finds Explosive Growth of AI Content on the Web
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/09/network-engineers-code.jpg
https://www.technewsworld.com/story/more-linux-malware-means-more-linux-monitoring-177174.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/12/Wi-Fi-7.jpg
https://www.technewsworld.com/story/next-generation-wi-fi-7-standard-expected-to-be-finalized-in-early-2024-178845.html
Next-Generation Wi-Fi 7 Standard Expected To Be Finalized in Early 2024
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/hacker-team.jpg
https://www.technewsworld.com/story/hacker-nation-the-worlds-third-largest-economy-179108.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/diverse-professionals.jpg
https://www.technewsworld.com/story/business-buyers-guide-for-a-better-pc-purchase-179116.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/SevaCare-Blood-Pressure-Monitor.jpg
https://www.technewsworld.com/story/sevacare-blood-pressure-monitor-offers-affordable-home-health-assurance-178951.html
SevaCare Blood Pressure Monitor Offers Affordable Home Health Assurance
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/smart-home-future.jpg
https://www.technewsworld.com/story/qualcomm-makes-the-smart-home-work-179142.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/Noble-Numbat.jpg
https://www.technewsworld.com/story/upgrading-to-ubuntu-24-04-lts-noble-numbat-step-by-step-guide-177359.html
Upgrading to Ubuntu 24.04 LTS Noble Numbat: Step-by-Step Guide
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/04/home-hacker.jpg
https://www.technewsworld.com/story/paranoia-in-the-home-1-in-3-americans-worried-about-their-smart-gadgets-being-hacked-178954.html
Paranoia in the Home: 1 in 3 Americans Worried About Their Smart Gadgets Being Hacked
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/Pat-Gelsinger-Intel-Vision-2024-event.jpg
https://www.technewsworld.com/story/intel-fights-back-major-ai-threats-ahead-and-michael-dell-is-back-baby-179119.html
Intel Fights Back, Major AI Threats Ahead, and Michael Dell Is Back, Baby!
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/02/mobile-app-security.jpg
https://www.technewsworld.com/story/mobile-security-firms-fortify-defenses-as-app-attacks-accelerate-179003.html
Mobile Security Firms Fortify Defenses as App Attacks Accelerate
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/dating-app-smartphone.jpg
https://www.technewsworld.com/story/mozilla-waves-red-flag-over-data-hungry-dating-apps-179144.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/02/Snapdragon-X-Elite.jpg
https://www.technewsworld.com/story/qualcomm-chip-closing-performance-gap-with-apple-m3-in-leaked-benchmarks-179039.html
Qualcomm Chip Closing Performance Gap With Apple M3 in Leaked Benchmarks
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/passkey.jpg
https://www.technewsworld.com/story/proton-adds-passkey-support-to-password-manager-knocks-big-tech-179110.html
Proton Adds Passkey Support to Password Manager, Knocks Big Tech
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/Beatbot-AquaSense-Pro-pool-cleaner.jpg
https://www.technewsworld.com/story/beatbot-aquasense-pro-just-in-time-for-summer-the-ultimate-robot-pool-cleaner-179122.html
Beatbot AquaSense Pro: Just in Time for Summer, the Ultimate Robot Pool Cleaner
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/Dysolve-Game-Lobby.jpg
https://www.technewsworld.com/story/ai-powered-software-offers-breakthrough-for-treating-dyslexia-178937.html
AI-Powered Software Offers Breakthrough for Treating Dyslexia
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/smartphone-user-perplexed.jpg
https://www.technewsworld.com/story/affiliate-marketing-contributing-to-substandard-search-results-study-178978.html
Affiliate Marketing Contributing to Substandard Search Results: Study
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/08/e-waste.jpg
https://www.technewsworld.com/story/disorganization-not-cost-fuels-the-it-e-waste-crisis-178570.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/iPhone-15-Pro.jpg
https://www.technewsworld.com/story/pundit-predicts-apple-ai-will-be-bound-to-iphone-analysts-react-179132.html
Pundit Predicts Apple AI Will Be Bound to iPhone, Analysts React
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/11/law-enforcement-investigators.jpg
https://www.technewsworld.com/story/tech-coalition-launches-initiative-to-crackdown-on-nomadic-child-predators-178773.html
Tech Coalition Launches Initiative To Crackdown on Nomadic Child Predators
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/12/Project-Kuiiper.jpg
https://www.technewsworld.com/story/amazons-competitor-to-musks-starlink-takes-critical-step-toward-deployment-178873.html
Amazon’s Competitor to Musk’s Starlink Takes Critical Step Toward Deployment
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/AI-robot-in-business.jpg
https://www.technewsworld.com/story/how-to-leverage-gen-ai-without-losing-the-corporate-shirt-179123.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/01/CES-2024-Innovation-Showcase.jpg
https://www.technewsworld.com/story/10-products-from-ces-2024-that-set-the-innovation-bar-178966.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2022/02/antitrust-law.jpg
https://www.technewsworld.com/story/the-dojs-flabby-antitrust-lawsuit-against-apple-179086.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/businessman-agreement.jpg
https://www.technewsworld.com/story/the-case-against-noncompete-agreements-179154.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/04/Francis-Scott-Key-Bridge-and-Cargo-Ship-Dali-NTSB.jpg
https://www.technewsworld.com/story/how-ai-could-have-prevented-the-key-bridge-collapse-179094.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/02/Tim-Cook-Vision-Pro-selfie.jpg
https://www.technewsworld.com/story/vision-pro-revives-one-and-done-app-purchases-179012.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2024/02/Apple-Vision-Pro-unboxed.jpg
https://www.technewsworld.com/story/apple-vision-pro-impressions-one-week-later-179019.html
https://www.technewsworld.com/wp-content/uploads/sites/3/2023/06/women-dont-play-emma-raz.jpg
https://www.technewsworld.com/story/women-dont-play-confronts-gender-disparity-in-the-tech-industry-178379.html
‘Women Don’t Play’ Confronts Gender Disparity in the Tech Industry