The view from the top of IT with TechWorld Editor Rohan Pearce
Microsoft is issuing five security bulletins this month, two of them critical and affecting all versions of Internet Explorer as well as all versions of Windows from XP to 8/8.1.
By Tim Greene | 06 March, 2014 23:01
Malware often does strange things, but this one -- which looked like Skype installed on a corporate domain controller -- was most "peculiar," says Jim Butterworth, a security expert at ManTech International, whose security subsidiary HBGary recently found the custom-designed remote-access Trojan on a customer's network.
By Ellen Messmer | 06 March, 2014 21:13
An updated Apple whitepaper on iOS security delves into an unprecedented amount of detail about the security architecture and features of the company's mobile OS for devices such as the iPhone and iPad. Security professionals and IT consultants are praising both the company's transparency and its approach to protecting iOS devices, Internet security and users' data.
By John Cox | 06 March, 2014 21:13
An asteroid measuring about 25 feet across will whizz safely past Earth today, the second such object in two days,
By Sharon Gaudin | 06 March, 2014 21:13
Microsoft will deliver five security updates to customers next week, two tagged as "critical," including one that will quash the open vulnerability in Internet Explorer that hackers have been exploiting since January.
By Gregg Keizer | 06 March, 2014 21:01
Texas Instruments is tapping into the growing trend among enthusiasts who want to make their own wearable devices and small electronics, announcing the Tiva C Series Connected LaunchPad mini-computer.
By Agam Shah | 06 March, 2014 20:51
The U.S. Federal Trade Commission should investigate Facebook's proposed US$19 billion acquisition of mobile messaging app WhatsApp -- and possibly block it -- because of the potential impact on users' privacy, two privacy groups said in a complaint filed Thursday.
By Grant Gross | 06 March, 2014 20:09
With some opening shots in a cyber component to the war of nerves in the Ukraine already fired, security analysts today offered a look at how a full-fledged cyberwar in the region would unfold.
By Gregg Keizer | 06 March, 2014 20:06
A Tip of the Hat to ZDNet's Larry Dignan for his incisive look at the state of IBM's cloud strategy after the unveiling of the BlueMix open cloud platform.
By Mike Bucken | 06 March, 2014 20:03
There are a lot of big names in the public cloud computing market: Amazon Web Services, Google, Microsoft, Verizon and Rackspace among them. And here's another company that's looking to make that list one day: Digital Ocean.
By Brandon Butler | 06 March, 2014 19:16
The figures released by the European Patent Office (EPO) on Thursday paint a grim picture of the European Union IT sector, but it also showed that some of the so-called global tech giants are not leading the way in innovation.
By Jennifer Baker | 06 March, 2014 18:17
Organizations can now add machine-generated data to their palate of information sources that can be aggregated and analyzed, thanks to a new connector jointly developed by Tableau Software, a provider of business intelligence software, and Splunk, which sells a log-file search engine.
By Joab Jackson | 06 March, 2014 17:50
The rate of increase in tablet shipments is expected to slow this year after unabated growth during the product category's first three years of existence.
By Agam Shah | 06 March, 2014 17:48
A new commercial tool designed to allow cybercriminals to easily transform legitimate Android applications into malicious software has hit the underground market, paving the way for cheap and easy development of sophisticated Android malware.
By Lucian Constantin | 06 March, 2014 17:35
Media company Getty Images had made about 35 million of its images embeddable in order to start gathering data and better monetize usage of its material, the company said on Thursday.
By Loek Essers | 06 March, 2014 17:25