Fake Receipt Program Targets Amazon Retailers Amazon retailers are being targeted by fraudsters who have created a custom-built a program that generates fakes receipts for nonexistent orders, according to... Share: |
Operation Payback: WikiLeaks Avenged by Hacktivists A hacktivist organization known as Anonymous is coming to WikiLeaks' defense with a botnet DDoS attack against PayPal and others. Share: |
IT Jobs Outlook Modest for 2011 Perhaps the best thing that will be said about 2010 and IT hiring is that large layoffs have tapered off and the overall trend seems to favor hiring. Share: |
Ten IT Trends to Watch in 2011 Ten 2011 business software trends will significantly impact IT organizations seeking to align IT operations with business objectives. Share: |
WikiLeaks Persists Despite Massive, Multifaceted Attacks In a profound (and to many, troubling) reflection on the resiliency of the Web, WikiLeaks has emerged stronger than ever. Share: |
WikiLeaks' Founder Assange Arrested in London Julian Assange was arrested by U.K. police after turning himself in to authorities on rape charges. Share: |
Google Message Continuity: Awesome Idea, Boring Name Share: |
WikiLeaks Founder Praised by Pentagon Papers Exposer Daniel Ellsberg, the man responsible for outing the now famous Pentagon Papers in 1971, and a group of ex-intelligence officers have thrown their weight behind... Share: |
Verizon iPhone a Reality Check for Android and AT&T A Verizon iPhone could either be really bad news or really good news for Android and AT&T. Share: |
Four Technologies for Faster Broadband in 2011 A number of different technologies are being developed or improved to offer higher speeds for fixed and mobile broadband networks. Share: |
Mobile Phones Poised to Replace Traditional Desktop Hand Sets Consumers continue to say the long goodbye to landline telephones. Share: |
WikiLeaks: A Terrorist's Best Friend? WikiLeaks and Julian Assange have finally gone too far after listing dozens of global facilities that may be targeted by terrorists. Share: |
Virtualization Boosts LG Android Phones LG has beaten the crowd to become the first to offer a phone that can switch between two virtualized identities. But who will it appeal to? Share: |
Dutch Arrest 16-year-old Related to WikiLeaks Attacks Dutch authorities arrested a 16-year-old boy on Wednesday in relation to the cyberattacks against Visa, MasterCard and PayPal, which were aimed at punishing... Share: |
A Crazy Data Back-up Scheme That Works Symform's groundbreaking online data backup offering is turning heads, but can it win over skeptics? Share: |
New Notepads: Better, Stronger, Faster These free replacements for Windows Notepad range from 'just plain better' to 'programmer's dream.' Find the text editor that best fits your needs. Share: |
What It's Like to Get Hit With a DDoS Attack Google. Twitter. Government websites. Fortune 500 companies. All have been victims of crippling distributed denial-of-service (DDoS) attacks. Share: |
Google Offers a Peek at Its Chrome Laptop. Hint: It's an NC Google gave the world a first look at its new Chrome OS laptop Tuesday. Share: |
Apache Resigns From Java Community Oracle loses the Apache Software Foundation from the Java Community Process Share: |
Nvidia Wants to Pack More Cores in Tablets, Smartphones Nvidia is looking to pack more CPU cores into mobile devices like smartphones and tablets as a way to improve performance while preserving battery life. Share: |
0 comments:
Post a Comment