News

apple store
grinch 620x465

Staples says hack may have compromised 1 million-plus payment cards

The attack hit stores in 35 states from California to Connecticut

Three ways enterprise software is changing

Today's IT shops must grapple with analysis, cloud computing and DevOps

samsung chromebook 2 lid detail oct 2014

Intel gives Chromebook converts an assist with 'Easy Migration' tool

The free tool will put your files, photos, and contacts in the cloud--but not your apps, of course

breach security

Worst security breaches of the year 2014: Sony tops the list

The breach of Sony Pictures Entertainment is clearly the biggest data breach of 2014, but theft of credit card numbers from retailers dominated the biggest cyber thefts.

Obama promises response on Sony hack, says pulling movie was mistake

His strong words came hours after the FBI said North Korea was responsible for the attack on Sony

north korea 970x546

What we know about North Korea's cyberarmy

Snippets of information about the secretive regime's cyberops have leaked out over the years

North Korea wants joint probe into Sony hack, warns of consequences if not

The country denies FBI allegations that it was responsible for a hack into Sony Pictures

Judge questions evidence on whether NSA spying is too broad

A federal lawsuit charges that the government's Internet surveillance is unconstitutional

Support for security tech tops iSoc's Africa plan for 2015

It also will continue to help develop traffic exchange and DNS programs

smartphone encryption

Organized criminals targeting individual iPhone, Android users

A well organized criminal group is targeting both iOS and Android users with highly targeted man-in-the-middle attacks, according to a new threat advisory from Akamai Technologies.

review 2014 thinkstock

2014 IT outsourcing in review: Grading our predictions

Last year, we predicted that smart machines would radically alter outsourcing, insourcing would increase and cloud computing would come down to earth. Now it's time to grade those and the rest of our predictions.

sony pictures water tower

After FBI blames North Korea for Sony attack, now what?

Expect copy-cat attacks and threats, say security experts

T-Mobile to pay $90M for unauthorized charges on customers' bills

The carrier will pay back subscribers as part of a settlement with the FCC

cloud enterprise

Buckle up IT: The enterprise needs you for cloud adoption

After ignoring IT for simple cloud moves, business is going to need help.

speck iphone 6 main

Our favorite cases for the iPhone 6 and 6 Plus

We try out a ton of cases, but there are some that we just keep coming back to, despite our differences in taste.

Trojan program based on ZeuS targets 150 banks, can hijack webcams

The new Chthonic Trojan borrows features from ZeuS and several of its spinoffs, researchers from Kaspersky Lab said

In 2015, EU aims to sweep away old rules on data protection and copyright

The Commision wants to break down national barriers to create what it calls a digital single market

parsix 7.0 review

Parsix GNU/Linux 7.0 review

In today's open source roundup: DistroWatch reviews Parsix GNU/Linux 7.0. Plus: The importance of mentors in open source, and WordPress 4.1 has been released.

Load More