The annual Pwn2Own browser-hacking competition has risen to mythical status over the years, with tall tales of security researchers exploiting within minutes browser technologies...
Yesterday, I wrote about the ignominious story of how Twitter user Naoki Hiroshima lost his @N Twitter account. The story involved somewhat questionable actions...
User information, whether it's preferences for where you buy coffee or application passwords, can be a valuable commodity. That's why it has long been...
Microsoft released its advance notification Jan. 9 for the scheduled Jan. 14, 2014, Patch Tuesday update, and it's surprising for a few reasons.The advance...
In February 2011, Intel completed its $7.68 billion acquisition of security vendor McAfee. It's a deal that brought the extensive technology assets as well...
Since June, the world has been learning, leak by pilfered document leak, the extent of the U.S. government's cyber-spying operations. National Security Agency (NSA)...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...