The browser market is heating up, with the major players poised to release new versions this spring, and Google having …
Conficker copycat prowls for victims, says Microsoft
An old, but little-known worm has copied some of the infection strategies of Conficker, the worm that raised a ruckus …
Google to buy Twitter?
The rumor mill is in full gear over speculation that Google may acquire Twitter. The news comes from two separate …
Symbian Foundation faces up to challenges
What was billed as a roundtable discussion for members of the new Symbian Foundation turned into an opportunity for them …
Conficker’s makers lose big, expert says
The malware makers who crafted Conficker must be extremely disappointed, a security expert said today, and not because the Internet …
EMC announces content archiving, e-discovery applications
EMC Corp. today announced a new family of e-mail archiving and e-discovery applications that can centrally managing multiple content types …
China denies cyberspy network charges
China denied suggestions it could be involved in a cyberespionage ring that attacked computers worldwide from servers mostly based in …
Conficker on April 1st: Eve of destruction or big joke?
Security experts say Conficker.C (also called Downadup) presents a serious threat. Infected machines — said to number from 3 million …
Google plans fifth birthday present for Gmail users
Google will announce the next step in Gmail's evolution, a new product with “a European multilingual angle,” on Monday. At …
IETF to explore new routing technique
The IETF is forming a new working group to address scalability issues in the Internet's routing system caused by companies …
Deep computer-spying network touched 103 countries
A 10-month cyberespionage investigation has found that 1,295 computers in 103 countries and belonging to international institutions have been spied …
Inside HP Labs: 8 cool projects
Innovation is both an exciting, revolutionary event and a mundane step-by-step process. For every remarkable, headline-making discovery — flash memory! …
Extreme makeover, wireless edition
Corporate reorganizations are becoming almost commonplace in this difficult economic climate. Even the largest, most storied institutions are finding themselves …
Fears of a Conficker meltdown greatly exaggerated
Worries that the notorious Conficker worm will somehow rise up and devastate the Internet on April 1 are misplaced, security …
iPhone gains smidge of enterprise cred
The Apple iPhone's credibility as an enterprise-class device continues to inch ahead. Perhaps the smartphone's most promising enterprise characteristics currently …
Google rolls out semantic search capabilities
Google has given its Web search engine an injection of semantic technology, as the search leader pushes into what many …
Slacker databases break all the old rules
So you've got some data to store. In the past, the answer was simple: Hook up an official database, pour …
China becoming the world’s malware factory
With China's economy cooling down, some of the country's IT professionals are turning to cybercrime, according to a Beijing-based security …
iPhone gains smidge of enterprise cred
The Apple iPhone's credibility as an enterprise-class device continues to inch ahead. Perhaps the smartphone's most promising enterprise characteristics currently …
Symantec says credit card data may have leaked from India
Symantec said on Monday that credit card information relating to three of its customers may have been leaked from its …