man-in-the-middle attack - News, Features, and Slideshows
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft, data theft, snooping, impersonation and malware infection. That's why so many people rely on public virtual private network services, but VPNs are no panacea. Here are five potential gotchas.
By Sohail Ahmad, independent Wi-Fi consultant | 31 October, 2012 14:48
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
This paper presents IDC's insights about implementing an internal or "private" cloud technology model; popular approaches to building an infrastructure platform, and how this strategy can allow IT organizations to respond to and support demand with dynamic business agility.
- Microsoft again writes off Surface inventory, renews profitability doubts
- Arrests made after international cyber-ring targets StubHub
- Sprint to resell Google Apps for Business cloud service
- What to expect in Facebook's earnings call today
- Google tried to buy music giant Spotify
- Pebble: Next-gen wearables will require new tech, also your personal data
- Low-cost Android tablets to get 4K video with Allwinner 64-bit chip
- Apple unwraps OS X Yosemite public beta Thursday
- Seagate wireless drive can now stream to Roku set-top box
- Is Sony's Walkman set to make a comeback?
- UK government adopts ODF for document exchange with citizens and suppliers
- Dutch spy agencies can receive NSA data, court rules
- Oracle ships nearly 60 mobile apps for JD Edwards
- BlackBerry offers BES10 as a hosted service through partners
- Mozilla ships Firefox 31, adds search to new tab page