Google Acquires iPhone Search Application reMail
Google on Wednesday acquired reMail, a popular iPhone application that provides "lightning fast" full-text search of your Gmail and IMAP e-mail accounts.
Read More ...
Expo: Animation education
You couldn't miss it unless you really wanted to. As attendees descended the long escalator down to the Moscone Center's North Hall for Macworld 2010, a series of colorful and melodious videos connected with their brain waves.
Read More ...
Over 75,000 systems compromised in cyberattack
Security researchers have unearthed a massive botnet affecting at least 75,000 computers at 2,500 companies and government agencies worldwide.
Read More ...
Adobe's DRM vexes e-book owners
Users say Adobe's copy protection technology fails to live up to the promise of interoperability between e-readers and e-book stores.
Read More ...
Microsoft says rootkit caused Windows blue screens
Microsoft confirmed that a rootkit caused Windows PCs to crash after users applied a security patch issued last week.
Read More ...
InfoWorld review: Databases primed for social networks
Neo4j, Cassandra, and FluidDB represent a breed of databases that swiftly search social networking data
Read More ...
Apple disses our DRM for iPad, Adobe says
Apple Inc. will not use Adobe Systems Inc.'s e-book digital rights management (DRM) technology, an Adobe executive said on Wednesday.
Read More ...
Mozilla patches critical Firefox bugs
Mozilla on Wednesday patched five vulnerabilities, three of them critical, in older editions of Firefox and in the process extended the support life of Firefox 3.0 by at least one more month
Read More ...
City of Norfolk hit with code that takes out nearly 800 PCs
Malicious code that mysteriously found its way onto an internal virtual print server took out nearly 800 computers used by the city of Norfolk, Virginia, last week.
Read More ...
The State of Web Security Issues
While security vulnerability research can expose technical weaknesses that may be exploited, incident research provides in-depth information about the most common targets, motives and attack vectors of modern hackers.
Read More ...
No comments:
Post a Comment