New exploits against VoIP continue to emerge, but experts say these demonstrations reveal the need for vigilant security and are not fatal flaws to the technology.
It was a Networkers 1998 - Philadelphia, I believe - where Cisco first announced CCNA to the general public. Now, 10 years later at Networkers 2008 (aka Cisco Live), Cisco is announcing some major additions to CCNA.
The cool, odd and interesting from the big networking show.
Check out our collection of iPhone-inspired devices. We'll start out with the latest announcements and finish it out with a few imitators still making the rounds.
Heidelberg University Hospital has conducted a study to determine how best to get people to read important e-mails about medical prescriptions that might otherwise get lost in the shuffle of spam and other messages.
Call it IBM's Math-To-The-Rescue Program. Big Blue this week said its researchers had created specialized algorithms to help model and manage natural disasters such as wildfires, floods and diseases.
What is true enterprise security and how do you get it? Bogus promises by vendors are all too common. In this interview, outspoken security analyst Nick Selby humorously tackles the truth about data leakage products, smartphone protection, hotspot th...
Microsoft professionals have a lot to keep track of, and a lot of market noise to contend with. That's why we've compiled this list of the 20 best places on the Web to help you find what you need. The list includes technology-specific sites, worthy b...
Don't feel so smug about how safety conscious you are by using a hands-free cell phone in the car: Carnegie Mellon University researchers say you're still likely going to be distracted.
A camera that is sophisticated enough to tell if you have sugar in your pocket, not cocaine from a distance of 25 metres, but doesn't see your naughty bits could find a home at security points in airports or at borders throughout the globe.
New research showing that smart cards with encrypted RFID chips might not be as secure as previously thought is raising concerns in Boston, where the subway CharlieCards use just such technology. The research raises the specter of thieves with US$1,0...
Dungeons & Dragons fans this week are mourning the death of Gary Gygax, 69, co-creator of what went from being a popular face-to-face game to being a much played online game as well.
The disk encryption technology used to secure the data in your Windows, Apple and Linux laptops can be easily circumvented, according to new research out of Princeton University.
Researchers are developing technology they say will use data mining and social networking techniques to spot and stop insider security threats and industrial espionage.
The FBI and the US Internet Crime Complaint Center today said that with Valentine's Day approaching, users should be on the lookout for spam e-mails spreading Storm Worm malware.