Microsoft Office isnt the only word-processing software at risk of zero-day hacker attacks.
According to a warning from anti-virus vendor Symantec, attackers are exploiting a...
Apparent Networks on Aug. 21 at VoiceCon will launch a version of its AppCritical network troubleshooting tool designed specifically for small and midsize enterprises...
A federal judge in Detroit has rejected the Bush administrations argument that the National Security Agencys wiretap program, which has been conducted for nearly...
Duration: 11:45
/zimages/6/28571.gifClick here to download this podcast.
/zimages/6/28571.gif
/util_get_image/1/0,3363,i=114836,00.gifTo subscribe to eWEEK podcasts, click here.
/zimages/6/28571.gifCheck out eWEEK.coms for the latest podcasts by eWEEK analysts, editors and...
The Environmental Protection Agency is preparing to release a new measurement specification designed to give customers a standard way to gauge the power consumption...
Red Hat Chief Technology Officer Brian Stevens has escalated to new heights the debate over whether the open-source Xen virtualization technology is ready for...
When Joe Stewart spotted a variant of the Mocbot Trojan hijacking unpatched Windows machines for use in IRC-controlled botnets, he immediately went to work...
Customer experience (CX) became the top brand differentiator in 2018, outpacing price, product quality and everything else. Businesses that offer a superior and differentiated...
The trickle-down effect of enterprise IT is as old as business technology. Vendors have long aimed new innovations at enterprises whose deep pockets and...