The data breach at the Staples office-supply chain may have affected roughly 1.16 million payment cards as criminals deployed malware to point-of-sale systems at 115 stores, the company said Friday.
By Zach Miners | 20 December, 2014 12:58
A federal judge on Friday questioned the strength of a key lawsuit challenging the constitutionality of the government's Internet surveillance program known as "upstream" data collection.
By Zach Miners | 20 December, 2014 10:46
North Korea seemingly wasted no time this week trumpeting Sony Pictures' decision to cancel the opening of The Interview, a comedy that portrayed an assassination plot against the country's dictator, Kim Jung-un.
By Gregg Keizer | 20 December, 2014 08:29
Once upon a time, life in the enterprise IT shop was fairly simple, at least conceptually speaking.
By Joab Jackson | 20 December, 2014 08:19
Google may be planning to launch a version of Android Auto for vehicle infotainment centers -- also known as head units -- that will eliminate the need for a smartphone to be connected, giving native access to the Internet and mobile applications.
By Lucas Mearian | 20 December, 2014 08:12
The FBI today named the North Korean government as responsible for the cyber attack against Sony Pictures last month, saying its technical analysis points to the isolated, Communist country.
By Gregg Keizer | 20 December, 2014 07:27
T-Mobile US will pay at least $90 million to settle a Federal Communications Commission suit that alleged it looked the other way while third parties charged T-Mobile subscribers for services they didn't want.
By Stephen Lawson | 20 December, 2014 07:15
For years, people in marketing or HR have been sneaking their apps and data onto the cloud, totally bypassing IT's approval or help.
By Sharon Gaudin | 20 December, 2014 07:09
Telecom companies are vying for control of a small company that rents out fiberoptic cables in Milan in a competition that could determine who gets to build and control Italy's high speed telecommunications network.
By Philip Willan | 20 December, 2014 07:05
President Obama believes Sony made a mistake in canceling release of "The Interview" following a major cyberattack and said the U.S. is prepared to respond to the attack, but he wouldn't say when or how.
By Martyn Williams | 20 December, 2014 07:03
Microsoft on Thursday sued two technical support companies, alleging that they infringed numerous Microsoft trademarks and practiced false advertising as they tricked consumers into paying for bogus help.
By Gregg Keizer | 20 December, 2014 05:25
A new computer Trojan based on the infamous ZeuS banking malware is targeting users of over 150 banks and payment systems from around the world, security researchers warn.
By Lucian Constantin | 20 December, 2014 05:13
The European Commission is gearing up to solve some longstanding problems with outdated copyright and data protection laws and move ahead on new rules for roaming charges and net neutrality.
By Loek Essers | 20 December, 2014 05:07
North Korea was responsible for the devastating cyberattack on Sony Pictures, the U.S. Federal Bureau of Investigation said Friday after a two-week investigation.
By Martyn Williams | 20 December, 2014 04:01
The attack on Sony Pictures has put North Korea's cyberwarfare program in the spotlight. Like most of the internal workings of the country, not much is known but snippets of information have come out over the years, often through defectors and intelligence leaks.
By Martyn Williams | 20 December, 2014 01:28
When Canadian food distributor George Weston Limited moved to Microsoft Office 365, it chose F5 Application Delivery Controllers to centrally manage user traffic to its Active Directory Federation Services (ADFS) servers.
This helpful infographic on mobile enterprise management (MEM) details the driving forces behind this new trend, as well important considerations regarding impact on cost, productivity and security. • Increasingly, the devices used for businesses are no longer company-owned, meaning an increase in necessary IT support • Companies are most interested in device management to alleviate security and compliance concerns • BYOD models benefit companies and end users with cost savings, choice, and to demonstrate progressiveness from IT staff
- Staples says hack may have compromised 1 million-plus payment cards
- Judge questions evidence on whether NSA spying is too broad
- Twitter parody of North Korea's mouthpiece not afraid to crow over Sony's capitulation
- Three ways enterprise software is changing
- Google may launch Android Auto, making your car a big mobile device
- After FBI blames North Korea for Sony attack, now what?
- T-Mobile to pay $90M for unauthorized charges on customers' bills
- Buckle up IT: The enterprise needs you for cloud adoption
- Companies battle for control of Italy's national fiber network
- Obama promises response on Sony hack, says pulling movie was mistake
- Microsoft hits Windows tech support scammers with lawsuit
- Trojan program based on ZeuS targets 150 banks, can hijack webcams
- In 2015, EU aims to sweep away old rules on data protection and copyright
- FBI concludes North Korea 'responsible' for Sony hack
- What we know about North Korea's cyberarmy