Government officials were able to secretly order Google and Internet service provider Sonic to hand over an individual's personal email records as part of...
Worried about aftershocks, Microsoft undertook a massive data migration project following the devastating earthquake and tsunami that hit northern Japan in March.While applications and...
As Operation "Occupy Wall Street" moved into the second week, some protesters are moving their activities online.A group using the handle "CabinCr3w" posted personal...
Senators Al Franken (D-Minn.), Chris Coons (D-DE) and Chuck Schumer (D-NY) are questioning the recent announcement by General Motors subsidiary, OnStar, that it would...
As a scam, it's fairly common for cyber-criminals to cold-call unsuspecting users to inform them of problems with their computers. Sometimes the callers claim...
Dutch certificate authority DigiNotar has closed its doors, less than a month after news broke about the security breach in which fake digital certificates...
The Federal Trade Commission is planning to hold a workshop to examine how increased use of facial recognition technology impacts consumer privacy and security....
Less than 48 hours after a national security organization released a report on cyber-threats and defenses, attackers breached its Website and posted the membership...
The SpyEye Trojan has evolved yet again, as the latest version can intercept Short Message Service texts from compromised Android smartphones.Dubbed "Spitmo," the new...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...