What do you do when your software is being used for nefarious purposes? Figure out a way to make someone else's life better.
In the Web world, distributed denial-of-service attacks can take out entire sites rather quickly. Mitigating the risk should be top of mind when building network architecture.
Can distributed denial-of-service attacks take down your network? The answer is yes, unless you plan for the worst.
Could tethering mobile devices with laptops have saved Steve Jobs WWDC keynote from being overtaken by Wi-Fi users?
Consumers and companies both need to pay attention to wireless security. These three tips can help make computing safer at your home and office.
Mobile networks will be tested during the inauguration, but every network will feel the strain in 2009. Providers need to better manage their bandwidth, resolving potential problems quickly.
Odds & Ends: QuickSilver hiss follow-up; G4 server crash; Disable Sherlock ads; AirPort and iBook problem; more
The 802.11n wireless networking protocol has finally become a standard. It's good news for consumers but shows how slow standards bodies move.
A Nokia-Siemens joint venture denies allegations it provided Internet wiretapping gear to Iran, leaving many to wonder who's aiding the Internet snoops? Or are their Net restrictions entirely homemade?
News.com reviews the major instant messaging services and evaluates which do the best job of protecting their users' security and privacy.