SCAN, DECODE, CREATE, SHARE with QR BARCODE SCANNER!Quick Scan is completely free and no ads. Change your smartphone into a powerful...
Showing results 1 to 20 of 4,698
Innovation is vital to business success. Tech Pro Research surveyed 353 respondents to find out more about the value of innovation to their organization.
Sponsored by Microsoft Cloud
A look at specific use cases where cloud data is fueling medical research and leading to improved outcomes.
OS X may have a better security reputation than Windows, but it's far from perfect.
A new technique devised by researchers at Australia's Swinburn University of Technology could help make the sort of 3D holographic displays that feature in sci-fi movies like Star Wars and Avatar a reality.
The bug should've been squashed in the latest update of OS X 10.10.3, but researchers say it persists. Every Mac is at risk from this "backdoor" bug.
***BETA VERSION***If you find a bug on your android / phone version, please email me (firstname.lastname@example.org) with a description and the...
Palo Alto Networks, McAfee, Websense gateway systems allow malicious traffic to slip through the net
Researchers claim a number of high-profile gateway solutions do little to interrupt or prevent malicious communications.
Researchers who report vulnerabilities in Dropbox software can expect a cash reward.
RotoView PDF Reader is a powerful PDF viewer similar to the many other fine PDF readers you can find in this store. And yet, this app...
Researchers claim a flaw that's existed for two-decades even affects the yet-to-be-released Windows 10. But Microsoft downplayed the severity of the vulnerability.
Industry cloud is an up-and-coming element within cloud computing. A Tech Pro Research survey shows that only 20 percent have ruled out using industry cloud within their organization.
Researchers' claims that the New South Wales online iVote system was vulnerable to a FREAK attack have been overstated, according to the state's Electoral Commission, which has questioned the researchers' motives.
Report says lack of basic password security was a top concern among researchers and a major factor in data breaches during 2014
Exemptions for technology researchers from laws that could see them jailed for sending certain information overseas have been extended in parliament.
Researchers from FireEye claim the security risks posed by the FREAK flaw are far from over.
Research analyzing today's smart home devices has revealed disturbing security implications for consumers.
Security researchers working for the CIA have been poking holes in Apple security as part of a multi-year campaign.
Apple is open sourcing Research Kit in a bid to turn the iPhone into a medical research tool.
Security researchers have identified a security flaw in the Google Admin console which allows attackers to claim domains and send out spoof emails.
Thirty percent of organizations are collecting big data, with telecommunications and engineering among the top industries collecting data, according to the latest Tech Pro Research research report.
Researchers at a Swiss institute have come up with a new technique for software testing that could make finished products more reliable.
Chinese hardware manufacturer Lenovo has come under fire for allegedly shipping consumer Windows laptops with software that hijacks secure website connections, as well as inserting ads into search results.