Our Top Stories | Is Google Corrupt? Google was thoroughly conned by SEO experts hired by JCPenney. Can we trust its search result rankings at all? Share: | 5 Ways to Make Sure You Aren't the Next Wikileak Here are five key tips to help your government agency or enterprise avoid being the source of the next Wikileak. Share: | New Windows Zero-Day Surfaces as Researcher Releases Attack Code A security researcher yesterday disclosed a new unpatched bug in Windows that some experts believe could be used to remotely hijack a PC. Share: | Tablets and Smartphones Force Cisco to Rethink Security Cisco has unveiled a self-described "complicated" security architecture dubbed SecureX that it says provides a context-aware way to safeguard networks increasingly overrun with smartphones, tablets and virtualization. Share: | Virtualization is Key to Cloud Security In a keynote address at the RSA Security Conference, RSA chief Art Coviello struck an optimistic tone about the future of security in cloud computing. Share: | Hacked and Now Vandalized, HBGary Pulls out of RSA The California security company that is at the center of a controversy over a plan to discredit WikiLeaks and its supporters abruptly pulled itself out of the... Share: | Windows Phone Reloaded: Can We Trust Ballmer's Promises? Microsoft promises multitasking, HTML5, and more for its underperforming mobile OS Share: | Microsoft Calls for Safer and Healthier Internet In his RSA keynote, Scott Charney outlined a vision for a cooperative, collaborative approach to Internet security mirroring our response to health epidemics. Share: | RIM, Nokia, DoCoMo Dodge Google's 'dumb Pipe' Menace Google's growing influence in the mobile industry is clearly proving worrisome to some established device makers and operators, a few of whom put up a united... Share: | Congress Takes Stab at "Do Not Track" Legislation A bill pending in Congress seeks to legislate some form of "do not track" system to protect online privacy. Share: | App Genome Project Finds Android Apps Outpacing iOS The App Genome Project from Lookout Mobile Security provides a detailed analysis of the Android Market against the Apple App Store. Share: | Google Payment System for Publishers Rivals Apple's Google Wednesday launched a payment system for publishers of digital content, one day after Apple unveiled a similar system for its App Store. Share: | Femtocells, Wi-Fi to Play Growing Role in Mobile Networks Some people may yet debate the value of femtocells, but the tide has turned: in 2010, the number of femtocells around the world exceeded the number of... Share: | SlideShare Aims to Simplify Web Meetings SlideShare has added Web conferencing to its site for posting, viewing, rating and commenting on business presentations, documents and videos, the company said... Share: | Google Still Answering Antitrust Questions From Texas AG Google is still working to satisfy a request made by the Texas Attorney General's office last summer for documents and information about its advertising systems... Share: | Government Employs Hackers in Brave New Scheme The Department of Defense will employ hackers under a brave new scheme pioneered by a hacker gone straight, but will it work? Share: | Apple: Foxconn "saved Lives" With Suicide Prevention Efforts Apple on Wednesday commended Taiwanese electronics manufacturer Foxconn for setting up a 24-hour care center, installing large nets on buildings and other... Share: | Dell Results Boosted by Enterprise Sales Dell on Tuesday reported a 177 percent year-over-year increase in net income for its fourth fiscal quarter of 2011, driven by growth in enterprise server and PC... Share: | Carriers Back LTE TDD for 4G Through New Initiative Mobile carriers including China Mobile, Bharti Airtel and Vodafone have launched a new initiative to promote the 4G (fourth-generation) network technology LTE... Share: | Microsoft Has a Change of Heart on How to Keep Internet Safe Should ISPs be the ones who keep hacked PCs off the Internet? Microsoft's chief security executive used to think so, but now he's had a change of heart. Share: | | | Sponsored Downloads | Adobe Acrobat 8 ProfessionalCreate, combine and control Adobe PDF documents without spending an arm and a leg. Not only create new documents but also edit existing documents, along with setting passwords, permissions and digital signatures. (Compatibility: Windows 2000, 2003, XP, Vista) Use coupon code AUTO-7NR9 at checkout for 50% off! | Disk Doctors UndeleteAn easy-to-use interface hides powerful file undelete technology. A few simple clicks and Undelete scans your hard drive locating deleted files, even if they've been removed from the Recycle Bin or even deleted by bypassing the Recycle Bin. It can undelete data from hard drives, flash drives, USB drives, SD cards, MMS and Firewire drives. (Compatibility: Windows XP, 2003, 2008, Vista and Windows 7) Please use coupon code DISK-U91W-MOO at checkout for 10% off! | | |
Newsletter Subscription Resources | You are subscribed to this newsletter as: dediyuan.technoworld@blogger.com Unsubscribe from this newsletter here. To add or remove newsletters, change your address, or change your format (HTML or text-only), please go here. If you have questions or comments about PCWorld e-mail newsletters, please contact: webmaster@pcworld.com PCWorld Privacy Policy © 2011 PCWorld Communications, Inc. All rights reserved. Reproduction in whole or in part in any form or medium without express written permission of PCWorld Communications, Inc. is prohibited. PCWorld is a registered trademark of International Data Group, Inc. All other trademarks used on PCWorld are the property of their respective owners. PCWorld Communications, Inc., 501 2nd St., San Francisco, CA 94107. | |
0 comments:
Post a Comment