News

breach security

Messaging app Line buys Microsoft's MixRadio music-streaming app

Microsoft says that Line gives MixRadio 'an excellent platform for expansion'


Cyberattack on German steel factory causes 'massive damage'

The hack is one of the rare examples in which a digital attack caused physical damage

Blackberry reports falling revenue, but loss shrinks

The company is increasing its distribution capability, pinning hopes on sales of its new Passport and Classic smartphones

Microsoft helps boost Android, iOS app performance with offline access

The company is offering a new developer tool to make offline access easier to implement

Casio's Latest Exilim High-Speed Camera Can Sync With Up to Seven Others

The EX-100Pro does synchronized high-speed shooting for around US$1,000

Nvidia GeForce GTX 980

The Best Gaming PCs and Hardware of 2014

It was a great year for gaming hardware. We pick our tested favorites, from mice to GPUs to full-blown PCs.

Critical vulnerability in Git clients puts developers at risk

Malicious Git code repositories can execute rogue commands on client machines interacting with them

Sale of Nigeria's Nitel bogs down in confusion yet again

Arabian Amlak For Investment says it had offered a much higher bid than NATCOM

Vulnerability in embedded Web server exposes millions of routers to hacking

Attackers can take control of millions of routers by sending a specially crafted request to RomPager, an embedded Web server running on them

Gaben

Give Yourself a Present (or Twenty): Steam's Holiday Sale is Here

Merry Gabemas and a Happy Steam Year!

Staples says hack may have compromised 1 million-plus payment cards

The attack hit stores in 35 states from California to Connecticut

Judge questions evidence on whether NSA spying is too broad

A federal lawsuit charges that the government's Internet surveillance is unconstitutional

Three ways enterprise software is changing

Today's IT shops must grapple with analysis, cloud computing and DevOps

byod frustration

BYOD Was a Tech Roller Coaster Ride in 2014

From the beginning, the Bring Your Own Device movement has been a nightmare for CIOs. And recently many workers – once excited by the concept – are wondering if it’s worth it. Here’s a look back at CIO.com’s year-long coverage of this...

Support for security tech tops iSoc's Africa plan for 2015

It also will continue to help develop traffic exchange and DNS programs

T-Mobile to pay $90M for unauthorized charges on customers' bills

The carrier will pay back subscribers as part of a settlement with the FCC

Obama promises response on Sony hack, says pulling movie was mistake

His strong words came hours after the FBI said North Korea was responsible for the attack on Sony

sony pictures water tower

After FBI Blames North Korea for Sony Attack, Now What?

More important than arguing over who attacked Sony Pictures is what companies do in response to the breach.

cloud enterprise

Buckle up IT: The Enterprise Needs You for Cloud Adoption

For years, people in marketing or HR have been sneaking their apps and data onto the cloud, totally bypassing IT's approval or help. Buckle up, IT, those days are coming to an end.

Load More