HomeLatest News

Latest News

Stripping Away Malware’s Armor

Getting around the defense mechanisms that malware writers erect isn't easy. From packers to run-time obfuscators, software-armoring techniques create problems for reverse engineers and...

Security Risks Very Real in Virtual Worlds

Virtual worlds can have some very real security concerns-something security researchers Charles Miller and Dino Dai Zovi showed Feb. 16 at the ShmooCon 4...

The (6-Week Long) End of Typing

My recent review of Microsoft's Response Point awakened in me an interest in speech recognition technology. Microsoft's product utilized speech recognition to help users...

Recruiters Dogpile on Ex-Yahoos

The struggling Yahoo laid off 1,000 workers this week. Gone are its vice president of marketing, senior manager of integrated campaign strategy and vice...

Comcast Denies Net Neut Violations

Network management techniques for handling peer-to-peer applications don't violate the Federal Communications Commision's network neutrality principles, Comcast said this week in its first extended...

Microsoft Sees Yahoo’s Mobile Potential as ‘Undervalued Gem’

It's no secret one of the traits that makes Yahoo so attractive to Microsoft are its mobile assets, but it's hard to quantify such...

What’s Behind the SCO Buyout

If I had a $100 million lying around, I really think I could find a better investment for my money than buying SCO. I...

Forecasting the Slow Movers

JDA Software Group is set to roll out this quarter a new forecasting algorithm that will address slow and erratic items for its E3...

Android Makes Like I, Robot

When Google unveiled Android last Nov. 5 the company positioned the open-source mobile operating system as a complete stack: operating system, middleware, user-friendly interface...

IDS Scheer to Build Execution Engine

ORLANDO, Fla.-IDS Scheer, which has made its living building business process modeling software, is developing its own execution engine.But company officials acknowledge that they...