|
White Paper: Rogue Wave Software The vulnerabilities and security issues that open source software can introduce into development projects make open source security a top priority. Read on to learn the strategies and tactics required to make it easy to acquire, distribute, use, monitor, analyze, and keep track of open source software to reduce risks and keep vulnerabilities of buggy software and applications to an absolute minimum. Read More ▶ |
Over the weekend hackers have managed to gain access to Facebook founder Mark Zuckerberg's Twitter and Pinterest accounts, as well as the social media accounts of other celebrities. Read More ▶ | |
The SoundLink Color from Bose is designed to be portable and durable, while still delivering the full, rich sound you would expect from Bose. Pairing is easy with simple voice prompts, and the unit can be paired with two devices, so when the first stops the second one can play. It comes in several stylish colors, has an auxiliary input jack for non-Bluetooth devices, and delivers up to 8 hours of music on a single charge. Read More ▶ | |
Since last week attackers have exploited an unpatched vulnerability in a WordPress plug-in called WP Mobile Detector that was installed on over 10,000 websites. Read More ▶ | |
|
Our roundup of intriguing new products from companies such as Arbor Networks and Data Dynamics. Read More ▶ | |
The two-factor authentication market has moved toward what is now being called multi-factor authentication. One of the key features being new types of hardware-based tokens. Here are individual reviews of nine MFA products. Read More ▶ | |
A new company launched Monday by former NASA chief Dan Goldin aims to deliver a major boost to the field of neural computing. Read More ▶ | |
The European Commission has signed a landmark agreement with the U.S. in its quest to legitimize the transatlantic flow of European Union citizens' personal information. Read More ▶ | |
Military health official warns that cyber hygiene falls short in health IT. Healthcare data breaches have hit more than nine out of 10 organizations in the field. Read More ▶ | |
I have come to the conclusion that most awareness programs are just very bad, and that like all security countermeasures, there will be an inevitable failing. Read More ▶ | |
If you're getting your dad a tech gadget as a Father's Day gift, it's easy to overreach and get him something that may be too ostentatious or complicated to use. Here are a bunch of practical presents instead. Read More ▶ | |
Two firms whose job candidates lost out in the last H-1B visa lottery have filed a lawsuit that seeks to end the current distribution system. Read More ▶ | |
With its patent-pending technology, JS++ focuses on compile-time type-checking but is not open source Read More ▶ | |
The Xperia X is a curiously flawed, mid-range phone with a high-range price. Watch Now ▶ | |
Research/Infographic: Level 3 Communications Simple conversations live at the heart of business. Level 3 Voice Complete lets you easily migrate to SIP, enabling you to have those conversations with customers, colleagues and partners with far greater reliability and security. Read More ▶ |
0 comments:
Post a Comment