Windows 10 will be supported until Oct. 14, 2025 — unless your computer has a Clover Trail CPU. Then you’re out of luck.
The nagware announcements are gone, but Microsoft, along with AMD and Intel, has made darn sure you’ll be running Windows 10 and not Windows 7 on the next PC you buy.
Putting back doors into any software, even once, is just asking for trouble.
The company is in the midst of a great transition, and current indications are that it is going well.
"Futurology has always bounced around between common sense, nonsense and a healthy dose of wishful thinking." That's how a 2012 Scientific American article summed up the history of prediction. Our compelling annual urge to predict the future traces back to the ancient Greeks and their Delphic Oracle--so who am I to argue with such venerable tradition? Here's my top 10 countdown for the shape of our industry in 2015:
It's not often that we take a moment to think about what we in security are grateful for so I would like to take a moment to think about things that have happened in the past year that have been improvements.
Google last week did something that is really hard to find objectionable: It said it deleted quite a few ("tens of thousands") nude pictures stolen from celebrities. But as with anything that involves such an influential company as Google, this move creates a precedent, and it's a dangerous one.
A vulnerable person. A sociopath or two on social media tormenting that person without consequence. That's trolling in a nutshell.
Facebook has grown and evolved in recent years. In addition to connecting people online, it bombards users with unnecessary ads and useless sponsored stories. And it runs experiments on its users. Columnist Alex Burinskiy is not amused.
Amazon launched a new smartphone this week. It's called the Amazon Fire phone, and it sports some unique hardware, software and services.
The 2014 World Cup tournament has kicked off in Brazil. Soccer (or football anywhere outside of the United States) is the most popular sport in the world, and billions of people will be following the matches closely. While you're busy figuring out how to stream games to your work PC while appearing to be busy with an Excel spreadsheet, you should be aware that World Cup will also be a feeding frenzy of malware and phishing attacks.
When it rains it pours for eBay. Less than a week after the popular website revealed it was the victim of a massive data breach and directed users to change their passwords, researchers have discovered that it is vulnerable to serious flaws that could allow an attacker to access user accounts. Individuals need to know how to guard against falling victim to these security issues, and other businesses need to learn from eBay's mistakes and do a better job of protecting resources on the Web.
The ultimate eavesdropping solution for people who want to see what their employees, kids or spouse are doing on their Android (or jailbroken iPhone) smartphone.
There are some movies that are timeless in nature. They can make you laugh. They can make you cry. They can inspire the viewer. Sometimes that inspiration is, well, shall we say, suboptimal.
We can do things now to make things a little easier should we face another widespread security defect in code like OpenSSL.
Whether you're talking about your network, your company's building or your home, a perimeter approach to security is no longer adequate. As McAfee discussed at the RSA Conference, you can't provide physical or electronic security simply by trying to prevent authorized access - you have to rethink all types to security to protect data and lives.
Smartphones, social networks, PCs, servers, cloud services, governments and national infrastructure all face security risks in 2014, according to the latest McAfee security report. On, and virtual currencies are being used to fund serious crimes. So, who wants a new career?
The ideas behind the NSA's spy program are built into a wide variety of tools available to everybody. W We walk you through the steps for building your very own PRISM-like program.
We've become so used to Internet spam, scams and fraudulent conduct that sometimes we forget that some of the scams currently operating in New Zealand and worldwide are so old they've grown whiskers. You don’t need the internet to run a scam.
IT is always developing - sometimes by evolution, and sometimes by revolution - but recent events have pushed that process into overdrive for key areas of communications and management of IT infrastructure. This goes well beyond technology, with fundamental impacts on how business is done, and how we balance our work-life activities.. Read more