With an ever-increasing data volume but by no means an ever-increasing IT budget, businesses are facing a tough task in …
BlackBerry to bring Balance software to Android, iOS
BlackBerry last week announced technology designed to securely separate work and personal data on Android and iOS smartphones and tablets, …
30 years of PCWorld, 30 pivotal moments in PC history
Talk about longevity. Thirty years ago to this month, PCWorld published its very first print issue, a 310-page magazine loaded …
Stuxnet ‘dates back to 2005’
Researchers from Symantec have found and analysed a version of the Stuxnet cyber sabotage malware that predates previously discovered versions …
Is VMware in trouble?
It would be hard to disagree with the opinion that VMware has had a tough couple of weeks. In the …
Better together
Dubai Municipality is renowned as one of the government’s most innovative entities, particularly in its work transforming standard city services …
MacLook: What to expect in 2013
If you include a very modest tweak of the Mac Pro’s specs, all of Apple’s Macs were updated in 2012, …
Costly cyber espionage on ‘relentless upward trend’
Cyber espionage is nothing new. So a report from the Defense Security Service (DSS) about efforts in foreign countries to …
Clearing in the clouds: 16 useful cloud management tools
One of the biggest concerns users have with public cloud resources is not knowing how much they will cost, given the pay-as-you-go …
Dexter malware infects point-of-sale systems worldwide:
Researchers from Israel-based IT security firm Seculert have uncovered a custom-made piece of malware that infected hundreds of point-of-sale (PoS) …
Microsoft Office 2013
Although consumers and businesses are turning more often to Web-based software and mobile apps, many millions still depend on Microsoft …
A look into information rights management
Information rights management (IRM) is the set of techniques and methods which protect the highly sensitive information of the organisation …
AMD targeting cloud with new Opteron processors
To break its slump in the server market, Advanced Micro Devices is embarking on an aggressive strategy that calls for …
Dual-identity smartphones to bridge BYOD private, corporate divide
Late next year, consumers will be able to buy smartphones that either come with native hypervisor software or use an …
The back-up plan
Deduplication is seen as an important strategy for data recovery, with the idea being if data is reduced, not only …
Dell profit slides 47% amid weak PC market
Dell has reported a sharp drop in revenue and profits for the third quarter as the weak PC market continued …
Anonymous fails to take down Facebook, Zynga
The hacktivist collective Anonymous celebrated Guy Fawkes Day on Monday by claiming it had stolen data from Symantec and ImageShack …
Getting worse
With the problem of hacking and its consequences on enterprise only exacerbating, CNME rounds up the views and tips from …
Seasons of change
A fundamental change in server architecture could be on tap as companies look to cut data centre costs and power consumption. …
Cybercriminals sell access to compromised corporate systems
A service discovered in the criminal underground is renting access to thousands of corporate servers that have been hacked through …