Sales of ‘in-game’ items will increase from $2.1 billion in 2011 to $4.8 billion in 2016, a report by Jupiter …


Sales of ‘in-game’ items will increase from $2.1 billion in 2011 to $4.8 billion in 2016, a report by Jupiter …

“Big data” analytics, security and cloud computing will be three of the most significant drivers of technological change in 2012, …

Gartner has revealed its top predictions for IT organisations and users for 2012 and beyond, and they herald changes in …

Defence and aerospace systems vendor Raytheon has acquired cybersecurity vendor Pikewerks in an effort to add to Raytheon’s capabilities to …

The attack that hacked RSA Security’s network earlier this year succeeded because the company failed to take a basic security …

All new malware being written for mobile devices targets Android, according to a McAfee report on malware trends in Q3 2011. …

The practice of “security by obscurity” on the Apple’s iOS needs to improve as smartphone adoption increases, according to Blue …

Security product provider Rapid7 has forayed into the Middle East market by tying up with Spire Solutions. The vulnerability management …

Motorola Mobility will lay off 800 people, the latest in a string of worker reductions at the handset maker, as …

Four years into the making and Microsoft?s Surface is beginning to look like the board room device of tomorrow. With …

Asia-Pacific’s business process outsourcing (BPO) market will reach revenues of US$17.47 billion in 2015, a compound annual growth rate (CAGR) …

The website for the open-source MySQL database was hacked and used to serve malware to visitors yesterday. Security vendor Armorize …

With a new CEO finally at the helm, AMD can begin to move forward in what has become an Intel …

As our society mobilises and more individuals use smart devices to access corporate data, cyber criminals are developing more sophisticated …

Internet Explorer is better at defending against drive-by downloads than competitors’ browsers and the contest isn’t even close, according to …

Cybercrooks are increasingly capitalising on the mass adoption of mobile devices by exploiting smartphone users at home or at work. …

Microsoft has launched a $250,000 contest for researchers who develop defensive security technologies that deal with entire classes of exploits, …

Traditional IT outsourcing customers are struggling with cloud computing, according to IT service providers and outsourcing advisors surveyed by KPMG …

Google is being scrutinised by the Federal Trade Commission (FTC) for allegedly deceptive practices when it comes to online search …

Sustainability will play an increasing role in organisations’ financial and operational performance, according to Gartner. By 2015, improving sustainability related …