Cloud computing is all the rage these days. CIOs seem to be diving into cloud-based solutions with reckless abandon despite the fact that a mistake in planning or execution can have career-limiting effects. So, let's take a moment to balance the bene...
This week's Twitter hack may not immediately drive corporate executives away from the microblogging site, but it may raising some early warning signs.
It may be difficult for enterprises to figure out how much they should spend on IT security, but research analyst Gartner has statistics on how much their peers are spending.
A 24-year-old law setting the rules on how law enforcement agencies can obtain electronic records needs to be updated because it's out of step with modern technology and privacy expectations, U.S. Senator Patrick Leahy said Wednesday.
Cisco has released its twice-yearly set of security updates for its switches and routers.
The emerging OAuth 2.0 Web API authorization protocol, already deployed by Facebook, Salesforce.com and others, is coming under increased criticism for being too easy to use, and therefore to spoof by malicious hackers.
<a href="http://www.networkworld.com/columnists/antonopoulos.html">Cloud computing,</a> especially <a href="https://www.networkworld.com/slideshows/2010/061510-cloud-security.html">public cloud</a> infrastructure-as-a-service is not yet a reality for...
The makers of the popular ZoneAlarm firewall, Check Point Software, have been accused of using scare tactics to get users to upgrade to the paid version of the software.
Security and compliance company ArcSight, which has been the subject of a takeover bid by HP, has upgraded its Enterprise Threat and Risk Management (ETRM) platform. The new version will include beefed-up ESM, the core analysis engine at the heart of...
A security flaw has made Twitter's website a chaotic and potentially unsafe place, filled with annoying pop-up windows that activate just by rolling the mouse over another user's tweets.
Linux is well-known for its security advantages over many other operating systems, but that doesn't mean it's immune to problems.
A highly sophisticated computer worm that has spread through Iran, Indonesia and India was built to destroy operations at one target: possibly Iran's Bushehr nuclear reactor.
Microsoft's full-disk encryption feature is not being widely used, even where it is part of the Windows operating system, according to a new survey released by security vendor Opswat.
A serious bug that led to a series of fast-spreading worms on Twitter's website Tuesday had been fixed in August but was accidentally re-introduced.
Google has introduced a Transparency Report that lets you see which countries are asking the search company for data on its users and making requests for data removal.
Latest News Articles
- Could Bitcoin's frothy venture funding dry up?
- AT&T to report on government requests for user data
- Alcatel sells federal technology unit for US$200 million
- Wall Street Beat: Economic growth, software news and BlackBerry deal boost tech stocks
- NSA defends foreign surveillance after new reports of targets
Most Popular Articles
- 1 What's the difference between an Intel Core i3, i5 and i7?
- 2 Laser vs. inkjet printers: which is better?
- 3 Windows 7 Home Premium vs. Windows 7 Professional
- 4 How do I connect my TV to the Internet?
- 5 How to play DVD movies on your Nintendo Wii
GGG Evaluation Team
First impression on unpacking the Q702 test unit was the solid feel and clean, minimalist styling.
Best Deals on GoodGearGuide
Best Deals on PCWorld
- Networking, Wireless & VoIPView all »
- NotebooksView all »
- TabletsView all »
- Mobile PhonesView all »
- Printers & ScannersView all »