iPad control surface for Reason! (PLEASE READ THE REQUIREMENTS BEFORE PURCHASING)rsTouch provides hands-on control for the Propellerhead...
Showing results 1 to 20 of 404
With a partner network numbering thousands, PC maker Lenovo turned to the cloud for secure, time-sensitive access authorisation.
The acquisition will help bolster McAfee's position in network security, which could be a further in-road to the enterprise where such solutions are absolutely vital. It also gives Intel a lucrative side project away from the ailing PC market.
In addition to jumping on the Windows Phone 8 bandwagon, the mobile carrier is trying its hand at hawking Windows 8 slates.
Organizations tend to trust manufacturers to ensure hardware in one's IT infrastructure stay safe, but more impetus needed to develop tools to safeguard device integrity, watchers urge.
Apple releases patch Thursday to curb Flashback malware, but one analyst says platform likely to come under "deep scrutiny" by cybercriminals and this could lead to more attacks in future.
Chris-PC Game Booster tunes Windows to use the CPU more efficiently, gets the most of your graphics card GPU, improves the network...
What is a Raspberry Pi, and why is it so deliciously priced? Is the new Conficker worm coming for your PC? What is Vodafone's network guarantee, and why are we all enemies of the internet?
With many commercial antivirus providers facing a shrinking market share as free software gain in popularity, observers advise that they will need to focus on marketing their level of protection and support.
SyncBackSE is a file backup and synchronization program with many options & extensive help. Backup, synchronize, or restore your files...
Amid criticisms current privacy policies to protect users are lacking, industry watchers note tighter rules may do more harm, and what is needed is a holistic approach.
Industry insiders share key takeaways from past year and how these can guide companies' security strategies in evolving IT landscape.
Launched in partnership with U.K. Citizens Advice Bureau, search giant backs new campaign which aims to educate users by simplifying online risks and security issues.
NYU prof Clay Shirky said that it will fall to the IT department to make social networking strategic---just like the PC, laptop and email.
As long-term evolution (LTE) networks, such as Telstra's new 4G network, bring about super fast mobile broadband to consumers across the globe, they could also potentially open up smartphones, tablets and other devices to hacks that previously only concerned PC users, according to network vendor Alcatel-Lucent.
Disallowing admin rights of employees' endpoint devices not realistic solution to preventing malware threats in today's self-service IT business climate, observers say.
HP will bank on integration of functionalities targeted at consumers and business users for its mobile operating system and build up ecosystem, exec says, adding developer interest is growing.
Users show lack of discipline by persisting in unsafe Web habits despite knowing risks involved, say security experts, who highlight the most common online mistakes.
Onus of securing smart devices should not be on employees and education-only method will not work, executive says, noting security of smart devices is becoming as important as PC security.
In new age of whistle-blowing where sites modeled after WikiLeaks allow anyone to disclose classified information, organizations must rethink enterprise security and risks, reveal observers.
In another life and another time, I ran the network testing program at PC Magazine. Back then, Mag (as it was called) evaluated application and device performance primarily on 10Mbps (gasp) or later a 100Mbps Ethernet link -- pretty much the state of the art then.
Following March breach and first related customer attack, vendor now extends SecurID replacement offer to organizations "focused on protecting intellectual property and corporate networks" to boost consumer confidence.
As hard-disk sanitization typically won't work on solid-state drives, organizations should include SSD-specific policies and be able to verify data erasure is clean, researchers urge.