There are a number of factors that make the IPv6 protocol suite interesting from a security standpoint. Firstly, being a new technology, technical personnel has much less confidence with the IPv6 protocols than with their IPv4 counterpart
Eric Schmidt, Google’s executive chairman, put a question to an audience Gartner’s Symposium ITxpo here on Monday. “Raise [your] hand if you’re sure the Chinese are not inside your corporate network.”
Once again shifting the spotlight away from PCs (and all that private business news), Dell is touting its enterprise storage portfolio — specifically a new set of all-flash storage solutions for big data-hungry applications.
In September, Serbia’s city of Novi Sad hosted the first-ever official hacker conference in the Balkans, BalCCon: First Congress (First Contact).
Google took down a record-breaking 5.3 million allegedly infringing links from its search engine in the last week of September, equivalent to just under nine links every second.
If you’re anything like me and like to keep up on the industry, you’ve no doubt been overloaded with news on the apparently epic Adobe hack. As some of you may no doubt point out I’m no apologist for companies who fail to take security seriously
The U.S. National Security Agency has repeatedly tried to compromise Tor, the government-funded online anonymity tool, but has had little success, according to a new report in the U.K.’s Guardian.
Phablets are fabulous. But they’re awfully large objects to be constantly pulling out of purses, backpacks and pockets. As we embrace giant smartphones for their big, beautiful screens
When companies relied on the static analysis of binaries to determine whether a program is malicious, attackers came up with a simple way to bypass defenses: obfuscating the code with packers and other techniques.
We all had a lot of fun making the trilogy of “Meet John Powers” videos earlier this summer, as did the cast and crew from Twist & Shout who produced the series.