Content Tags Index Page - Page 4
The Cryptography vulnerability first detailed in 1998, still has the potential to impact modern websites.
DAILY VIDEO: A researcher discovers a hidden keylogger in an HP keyboard driver; Microsoft releases a free preview of its Quantum Development Kit; Microsoft is investing $50 million for AI-enabled environmental research; and there's more.
Three individuals plead guilty for their roles in Mirai cyber-attacks, as court documents provide new insight into how the IoT botnet operated.
The cons to enabling employees to work from anywhere at any time can outweigh the pros if you don't have the right tools. Here are 10 apps that will help distributed teams realize their full potential.
A survey of corporate "cloud infrastructure professionals" found that many of them don't have a clear idea of how much they are spending on cloud services or what services or benefits they are getting for their money.
New capabilities and products announced by Juniper at its NXTWORK event aim to make security simpler to deploy and automate.
The processors are based on the chip maker’s 14nm Gemini Lake architecture and look to strike a balance between performance and connectivity.
Heap automatically captures, validates and connects all types of customer data, giving companies in various sectors the ability to discover meaningful customer insights in order to drive better business decisions.
eWEEK Staff | Updated
DAILY VIDEO: Newly revealed flaw in Intel processors allows undetectable malware; Google blocking Amazon Fire TV, Echo Show users from YouTube access; Apple Pay Cash allows person-to-person payments from Apple devices; and there's more.
NEWS ANALYSIS: Cyber-security threats will likely get worse next year as attacks get more sophisticated, but for organizations the focus will shift to loss prevention.