A federal judge has ruled that the nearly 2,000 pages of documents the bureau produced in response to EPIC's request under the Freedom of Information Act likely don't constitute all of the relevant material and ordered the FBI to conduct another search
There is a growing debate in the cryptography community over whether the cryptographic keys used in dozens of applications should be considered compromised in light of a recent paper detailing a more efficient way of factoring large numbers
Even the most vigilant enterprise IT professionals have been forced into reactionary postures by ceaseless new vulnerabilities, increasingly sophisticated hacker tools and heightened threats of cyber-terrorism. The goal of this eWEEK Special Report is to
Want a good deal on 1,000 desktop PCs? Or how about a big Internet router? Or, for that matter, an entire new IT infrastructure? As any IT manager with a few bucks still in the budget knows, now is a very good time to strike some very good deals.