adv

Features

Jul 10, 2009
A common misconception is that a shiny new computer is more or less secure because it hasn't yet been exposed to the Internet's sinister underbelly. But the truth is, these...
Jul 10, 2009
Cybersquatters are siphoning away increasing numbers of users from the Web sites of businesses large and small. Using variations on trademarked names, cybersquatters may lure...
Jul 9, 2009
A botnet composed of about 50,000 infected computers has been waging a war against U.S. government Web sites and causing headaches for businesses in the U.S. and South Korea.The...
Jul 8, 2009
An attacker who wants to break into one of your accounts manually might first try likely passwords such as your pet's name, your anniversary, or other terms that are significant...
Jul 8, 2009
Network thoroughbred Cisco jumps into the blade server market. Server stallion HP adds security blades to its ProCurve switches. IBM teams up with Brocade. Oracle buys Sun. And...
Jul 7, 2009
In these tough economic times it is increasingly common for C-level executives to come to IT saying: "I've read about that cloud computing thing. Why aren't we using the cloud...
Jul 6, 2009
The second quarter officially ended on June 30 with technology stocks leading all others. The question is, after a strong second quarter run, where do they go from here? Some...
Jul 6, 2009
A U.S. company will seek legal action against Lenovo, Acer and Sony next week over their shipment in China of controversial software that the company says stole its programming...
Jul 6, 2009
One of the reasons security is fun and interesting is that it requires a constant upgrade of your skills and knowledge.Here is a skill that you may not have realized you need, but...
Jul 6, 2009
Admit it: You are currently addicted to social networking. Your drug of choice might be Facebook or Twitter, or maybe Myspace or LinkedIn. Some of you are using all of the above,...