Outsourced software is a hotspot for the sort of hidden security problems that leave applications vulnerable, an analysis by code testing outfit Veracode has warned.
Contrary to reports, a bug that Microsoft patched last week had been publicly discussed a year and a half ago, security researchers said this week.
Cloud computing is all the rage these days. CIOs seem to be diving into cloud-based solutions with reckless abandon despite the fact that a mistake in planning or execution can have career-limiting effects. So, let's take a moment to balance the bene...
This week's Twitter hack may not immediately drive corporate executives away from the microblogging site, but it may raising some early warning signs.
It may be difficult for enterprises to figure out how much they should spend on IT security, but research analyst Gartner has statistics on how much their peers are spending.
A 24-year-old law setting the rules on how law enforcement agencies can obtain electronic records needs to be updated because it's out of step with modern technology and privacy expectations, U.S. Senator Patrick Leahy said Wednesday.
Cisco has released its twice-yearly set of security updates for its switches and routers.
The emerging OAuth 2.0 Web API authorization protocol, already deployed by Facebook, Salesforce.com and others, is coming under increased criticism for being too easy to use, and therefore to spoof by malicious hackers.
<a href="http://www.networkworld.com/columnists/antonopoulos.html">Cloud computing,</a> especially <a href="https://www.networkworld.com/slideshows/2010/061510-cloud-security.html">public cloud</a> infrastructure-as-a-service is not yet a reality for...
The makers of the popular ZoneAlarm firewall, Check Point Software, have been accused of using scare tactics to get users to upgrade to the paid version of the software.
Security and compliance company ArcSight, which has been the subject of a takeover bid by HP, has upgraded its Enterprise Threat and Risk Management (ETRM) platform. The new version will include beefed-up ESM, the core analysis engine at the heart of...
A security flaw has made Twitter's website a chaotic and potentially unsafe place, filled with annoying pop-up windows that activate just by rolling the mouse over another user's tweets.
Linux is well-known for its security advantages over many other operating systems, but that doesn't mean it's immune to problems.
A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran's Bushehr nuclear reactor.
Microsoft's full-disk encryption feature is not being widely used, even where it is part of the Windows operating system, according to a new survey released by security vendor Opswat.
Latest News Articles
- Alcatel sells federal technology unit for US$200 million
- Wall Street Beat: Economic growth, software news and BlackBerry deal boost tech stocks
- NSA defends foreign surveillance after new reports of targets
- In 2014, more retailers might know how you shop
- DOJ releases Megaupload discussions about mass infringement
Most Popular Articles
- 1 How to update your Samsung Galaxy S4 to Android 4.3 Google Edition
- 2 Portable Air Conditioners
- 3 Tethering tutorial: How to use your iPhone as a modem
- 4 Capacitive vs resistive touchscreens
- 5 LCD vs plasma vs LED TVs buying guide
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Printers & ScannersView all »
- Networking, Wireless & VoIPView all »