It’s going to be hard to top Topeka Capital analyst Brian White’s comment to clients that the anticipated Apple iPhone 5 launch this Wednesday could be the “biggest upgrade in consumer electronics history.” But plenty of other Wall Street analysts aren’t holding back either.
Bob Brown |
12 Sep |
Read more
Emma Watson, best known for her portrayal of Hermione Granger in the Harry Potter movies, has been named most dangerous celebrity to search for on the Web in McAfee's annual report.
Bob Brown |
10 Sep |
Read more
GSM cellular networks leak enough location data to give third-parties secret access to cellphone users' whereabouts, according to new University of Minnesota research.
Bob Brown |
18 Feb |
Read more
North Carolina State University researchers say some <a href="http://www.networkworld.com/news/2010/110910-google-android-useful-resources-smartphones.html">Android</a> smartphone makers' efforts to go above and beyond the Google mobile platform's basics open their devices to security breaches.
Bob Brown |
01 Dec |
Read more
New research conducted on behalf of the Wi-Fi Alliance shows that while wireless users are making strides on the security front, they’re still leaving their Wi-Fi networks too open to intruders.
Bob Brown |
06 Oct |
Read more
Hacker group LulzSec ("the world's leaders in high-quality entertainment at your expense") has had its initial Google+ account nixed this week, though LulzSec has quickly and brashly re-emerged with a new one
Bob Brown |
03 Aug |
Read more
Apple Friday issued a software security update designed to fix a Safari PDF rendering system vulnerability exploited by jailbreakers and that could have been used by hackers to infect Apple’s mobile devices, including iPhone 4 and iPad 2.
Bob Brown |
16 Jul |
Read more
The University of Southern California has signed a 5-year, $16 million contract with the Department of Homeland Security to expand USC's DETERlab "mini-Internet" security testbed.
Bob Brown |
15 Jan |
Read more
A Sophos IT security consultant has issued a warning not to fall prey to malware that uses a PowerPoint presentation demonstrating sexual positions from the Kama Sutra as its lure.
Bob Brown |
13 Jan |
Read more
WikiLeaks founder Julian Assange has finished as a runner-up to Facebook CEO Mark Zuckerberg as Time's 2010 Person of the Year.
Bob Brown |
16 Dec |
Read more
Don't get Patrik Runald wrong: the Downadup worm (also called Conficker) has been a big deal.
Bob Brown |
06 Mar |
Read more
M&A industry veteran Paul Deninger, a vice chairman at Jefferies & Co., has made a living advising companies on mergers, acquisitions, IPOs and the like. But even he acknowledges that too much industry consolidation isn't a good thing for technology innovation. I spoke with Deninger this week about the state of the M&A market and what’s likely ahead.
Bob Brown |
15 Dec |
Read more
Microsoft's US general manager/chief security advisor for its National Security Team thinks like a true security professional: In every bit of good news, Bret Arsenault wonders what bad news could be lurking behind it.
Bob Brown |
27 Mar |
Read more
We often hear corporate IT pros complain that justifying security expenses is tough because they don't necessarily generate revenue or enable new business opportunities. In fact, figuring out the economics of IT security is so challenging for customers and vendors that lots of the world's best researchers are putting their minds to the task.
Bob Brown |
10 Jul |
Read more
Honeypots have largely been relegated to use by academia and antivirus vendors because most enterprise IT teams figure they're too expensive to run and could land their companies in legal trouble. But honeypots aren't as scary as all that, according to an expert on the topic who spoke at the InfoSec World Conference & Expo in Orlando Tuesday.
Bob Brown |
22 Mar |
Read more