news Does VMware Move Signal That Big Data Is Ready for Prime Time? Deploying, configuring and maintaining Hadoop clusters is challenging and time-intensive, but VMware aims to change that with a new open source project that virtualizes the Hadoop cluster and makes it ready for the cloud. By Thor Olavsrud Jun 13, 2012 3 mins Business Intelligence Server Virtualization System Management news Power and Ego, Not Money, May have Fueled Alleged Dutch Hacker David Benjamin Schrooten, now in U.S. custody, indicated he wanted to come clean, a computer security expert said By Jeremy Kirk Jun 13, 2012 5 mins Cybercrime Legal Security news Flame Crypto Attack Was Very Hard to Pull Off, Security Researcher Says The MD5 collision attack carried out by Flame's authors took more attempts to pull off than the RapidSSL one in 2008 By Lucian Constantin Jun 12, 2012 3 mins Encryption Intrusion Detection Software Security news Online Marketers Need to Police Privacy Before the Feds Step In When it comes to marketing practices, businesses must adopt a more serious approach to protecting consumer privacy via meaningful industry self-regulation. If they don't, it's likely that there will be more rigorous oversight of the industr By Kenneth Corbin Jun 12, 2012 3 mins Government Marketing Regulation news Dell ‘Super Excited About Windows 8,’ Vows No Dell Smartphones Michael Dell talks plans for a bevy of mobile device to launch with Windows 8, weighs in on company's strategy for security, cloud computing. By Kenneth Corbin Jun 12, 2012 4 mins Small and Medium Business Smartphones Ultrabook news Microsoft Q&A: With Windows 8, the Choice Is Yours Day two at Microsoft TechEd 2012 was all about Windows 8. CIO.com caught up with Windows corporate VP Antoine Leblond, who discussed why CIOs should test Windows 8, why developers should love it, and why we'll all be touching our laptop screens By Shane O'Neill Jun 12, 2012 7 mins Encryption Laptops Small and Medium Business news If Megaupload Users Want Their Data, They’re Going to have to Pay The U.S. government says it doesn't have the data and isn't opposed to users retrieving it By Jeremy Kirk Jun 12, 2012 3 mins Internet Legal news Dutch Citizen Charged with Fraud, Identity Theft in Hacking Case David Benjamin Schrooten was extradited from Romania to the U.S. in March By Jeremy Kirk Jun 11, 2012 2 mins Cybercrime Fraud Legal news MySQL Vulnerability Allows Attackers to Bypass Password Verification Exploit code is available for a MySQL authentication bypass vulnerability By Lucian Constantin Jun 11, 2012 3 mins Data Management Patch Management Software Security news Security Researchers Discover Link Between Stuxnet and Flame Security researchers from antivirus vendor Kaspersky Labs have found evidence that the development teams behind the Flame and Stuxnet cyberespionage threats collaborated with each other. By Lucian Constantin Jun 11, 2012 3 mins Intrusion Detection Software Security news European League of Legends Game Players have Their Account Data Compromised League of Legends developer notifies users that hackers have breached its European databases By Lucian Constantin Jun 11, 2012 3 mins Data Breach Encryption Security news The World’s Best (and Worst) IT Cities to Work and Play Despite all the economic and political strife in the world, the globe-trotting techie still has opportunities for working at home and abroad — and even take in an adventure! For every hot spot, however, there's an evil twin nearby. Here are som By Tom Kaneshige Jun 8, 2012 6 mins Careers IT Jobs news 15 open source big data technologies to watch Big data is making a big splash these days and open source technology is at the core of most of these big data initiatives. Here are 15 key open source big data technologies to keep an eye on. By Thor Olavsrud Jun 8, 2012 8 mins Data Management Open Source news Flame’s Windows Update Hack Required World-Class Cryptanalysis, Researchers Say The Flame cyber-espionage malware makes use of a previously unknown cryptographic attack variant that required world-class cryptanalysis to develop, experts from the Dutch national research center for mathematics and computer science (CWI) said on Th By Lucian Constantin Jun 8, 2012 3 mins Encryption Malware Security news DreamWorks, HP Ring in Era of ‘Super Customer’ Most IT vendors use their annual conferences to tell attendees what customers are doing. This year HP brought DreamWorks, complete with Alex the Lion, on stage at Discover 2012 to discuss how HP's helping it realize the goal of real-time animati By Rob Enderle Jun 8, 2012 5 mins Collaboration Software IT Strategy Small and Medium Business news Apple Agrees to Pay Penalty Over 4G Ipad Claims in Australia The proposed penalty has been submitted to Australia's Federal Court for approval By Jeremy Kirk Jun 8, 2012 2 mins Computers and Peripherals Regulation news How Charles Dickens Helped Crack Your Linkedin Password Researchers are using words from classic novels to crack the LinkedIn password hashes By Jeremy Kirk Jun 8, 2012 4 mins Security news Apple’s WWDC 2012: Expect MacBook Refreshes, Siri Update Is a refresh of the MacBook Pro and Air coming? Will Apple go "broader" with Siri? What about Apple striking a deal with Facebook? Yes. Maybe. Probably not. By Tom Kaneshige Jun 7, 2012 3 mins MacBook Tablets iPhone news Flame Authors Order Infected Computers to Remove All Traces of the Malware Flame self-desctruct module overwrites file data to prevent forensic analysis By Lucian Constantin Jun 7, 2012 3 mins Intrusion Detection Software Security news Dating Site Eharmony Confirms Password Breach Password hashes for eHarmony were released on the same Russian forum which published the LinkedIn hashes By Jeremy Kirk Jun 7, 2012 2 mins Security news 10 Superhero Powers Every CIO Should Have These 10 super powers would make even the most beleaguered CIO an IT hero. Let's just hope they use their new-found power for tech good. By Jennifer Lonoff Schiff Jun 6, 2012 3 mins CIO IT Skills news ‘LeakedIn’ Web App Checks for Compromised Linkedin Passwords It is believed millions of the LinkedIn password hashes have been cracked, putting users at risk By Jeremy Kirk Jun 6, 2012 4 mins Security news Linkedin Stops Collecting Calendar Meeting Notes Through its Mobile Apps LinkedIn updated its Android and iOS apps to no longer send calendar meeting notes back to its servers when calendar integration is enabled By Lucian Constantin Jun 6, 2012 3 mins Privacy Security Social Networking Apps news 6M LinkedIn Passwords Leaked: How to Change Your Password LinkedIn is investigating claims that more than 6 million user passwords were compromised. Here are step-by-step instructions for changing your account password. By Kristin Burnham Jun 6, 2012 2 mins Data Breach LinkedIn Privacy news Windows 8 Release Preview: Enterprise Features Worth Evaluating For CIOs deploying Windows 7, the Windows 8 Release Preview may be an afterthought. But tablet-friendly Windows 8 delivers security, networking and mobile features that enterprise IT should test now to implement later. By Shane O'Neill Jun 6, 2012 5 mins Encryption Laptops Small and Medium Business news Yahoo Implements Latest Antispam Defense Yahoo is rolling out the DMARC system this week, which helps email providers eliminate bogus messages By Jeremy Kirk Jun 5, 2012 2 mins Security news Facebook Joins Google, ISPs in Notifying DNSChanger Victims Facebook alerts owners of DNSChanger-infected computers that they need to take action before July 9 By Lucian Constantin Jun 5, 2012 2 mins Intrusion Detection Software Security Windows Security news Meet the 2012 CIO 100 Award Winners These 100 companies are being honored for distinguishing themselves by creating business value through the innovative use of IT By CIO staff Jun 5, 2012 2 mins Innovation news Researchers Find Ways to Bypass Google’s Android Malware Scanner Mobile security researchers devised methods that could allow Android malware to detect when it's being analyzed by Google's Bouncer system By Lucian Constantin Jun 5, 2012 3 mins Intrusion Detection Software Mobile Security Viruses news Adobe Patches Critical Vulnerabilities in Photoshop and Illustrator CS5.x Adobe keeps its promise and releases security patches for older Photoshop and Illustrator versions By Lucian Constantin Jun 5, 2012 2 mins Patch Management Software Security news Google Acquires Social Media Toolbar Maker Meebo Meebo's advertising-driven toolbar integrates with social media sites such as Twitter and Facebook By Jeremy Kirk Jun 4, 2012 1 min Internet Mergers and Acquisitions news Finance Services Leaders Appeal for Limited Government Aid to Fight Cyber Attacks Industry experts seek limited action from feds in areas such as sharing information about threats and securing the supply chain. By Kenneth Corbin Jun 4, 2012 6 mins Data Breach Government IT Regulation news ‘SwaggSec’ Claims Hack of China Telecom, Warner Bros. The alleged data haul includes internal documents and administrator login credentials By Jeremy Kirk Jun 3, 2012 2 mins Security news Microsemi Denies Existence of Backdoor in its Chips, Researchers Disagree Researchers who claim that ProASIC3 chips have a built-in backdoor respond to Microsemi By Lucian Constantin Jun 1, 2012 4 mins Computers and Peripherals Security news U.S. Lawmakers Blast U.N. for Internet ‘Powerplay’ While a State Department official says that the proposed expansion of U.N. Internet authorities would have only a modest effect on the U.S., lawmakers say they are united when it comes to keeping the Internet free from centralized control and prevent By Kenneth Corbin Jun 1, 2012 5 mins Government Internet Regulation news Flame’s Bluetooth Functionality Could Help Spies Extract Data Locally, Researchers Say Attackers could pinpoint the physical location of infected computers using Flame's Bluetooth functionality By Lucian Constantin Jun 1, 2012 3 mins Intrusion Detection Software Malware Windows Security news In a BYOD World, Is IT Redundant? Reports of the death of IT departments in the Bring Your Own Device era have been exaggerated. However, if IT doesn't accept its new role — one that's focused less on individual user support and more on setting policies — then it might b By Rob Enderle Jun 1, 2012 5 mins Privacy Smartphones Supply Chain Management Software news Online Services Increased Their Effort to Protect User Data, EFF Says The Electronic Frontier Foundation hopes to stimulate transparency and encourage companies to stand up for user privacy By Loek Essers Jun 1, 2012 3 mins Government Privacy news Browser Feature Can Be Abused to Misrepresent Download Origin, Researcher Says A researcher shows how users can be tricked into thinking that rogue downloads have been initiated by legitimate websites By Lucian Constantin May 31, 2012 4 mins Browsers Intrusion Detection Software Security news BYOD’s Phone Number Problem A simple smartphone number can be an incredibly important corporate asset, but companies will have to give it up in a BYOD scenario. By Tom Kaneshige May 31, 2012 3 mins Legal Personal Software Smartphones news Gamereplays Invites Hackers to Probe Site Following Data Breach An Anonymous hacker alienates potential supporters By Lucian Constantin May 31, 2012 3 mins Data Breach Intrusion Detection Software Security news Proposal Aims to Improve EU Software Repository System Adding more metadata should make European open-source projects easier to find and reuse By Loek Essers May 31, 2012 3 mins Government IT news Mobile Tech, Social Media Force FTC to Revisit Advertising Guidelines The Federal Trade Commission is looking to update 12-year-old framework for disclosure and privacy as marketers increasingly seed messages on mobile devices and social networking sites. By Kenneth Corbin May 31, 2012 5 mins Government Regulation Small and Medium Business news For CIOs, the Games Are Just Beginning Companies are starting to use the motivational techniques of video games — such as points, leaderboards and levels — to create more engaging business applications. It's called "gamification." By Michael Hugos May 31, 2012 3 mins CIO Innovation news BYOD: Time to Adjust Your Privacy Expectations Employees who want to use their smartphones and tablets for work better be prepared to sign on IT's dotted line and essentially give away their privacy rights. By Tom Kaneshige May 30, 2012 5 mins Legal Privacy Smartphones news European Commission Favors Consumer Choice Over Net Neutrality Legislation European Commission Vice President Neelie Kroes won't legislate net neutrality for all, but those who want "access to a robust, best-efforts Internet with all the applications they wish" should have the opportunity to buy such a servic By Loek Essers May 30, 2012 4 mins Government Internet Regulation news Copies of Anti-Censorship Software Used in Iran and Syria Contain Keylogger Rogue copies of Green Simurgh, an Internet proxy software application used in Iran and Syria, have been found to contain malware that records users' activities and keystrokes. By Lucian Constantin May 30, 2012 3 mins Encryption Firewalls Intrusion Detection Software news 10 Mobile Device Management Apps to Take Charge of BYOD Managing devices in a BYOD environment is no mean feat, and the right mobile device management (MDM) product can be a key component in making it work. Here are 10 leading MDM products on the market today. By Thor Olavsrud May 29, 2012 3 mins Consumer Electronics Enterprise Applications Small and Medium Business news Romanian Authorities Dismantle Hacker Group Targeting Government Websites Romania's organized crime prosecutors detained 12 individuals suspected of hacking into official websites By Lucian Constantin May 29, 2012 3 mins Cybercrime Data Breach Intrusion Detection Software news New Federal Mobile IT Strategy Must Address Security As the White House rolls out an agenda to open and optimize government data for mobile devices and accelerate use of smartphones and tablets across departments and agencies, security expert warns that federal CIOs must address an array of vulnerabili By Kenneth Corbin May 29, 2012 6 mins Government Government IT Security 1…596061626364656667…297 Show me moreLatestArticlesPodcastsVideos brandpost Sponsored by Fivetran You’re not ready for agentic AI By Taylor Brown, COO and Co-founder of FivetranOct 2, 20255 mins Artificial Intelligence news Salesforce Trusted AI Foundation seeks to power the agentic enterprise By Thor OlavsrudOct 2, 20254 mins Artificial IntelligenceEnterprise ApplicationsSalesforce.com opinion Why CIOs must be business leaders first, technologists second By Nazih BattalOct 2, 20256 mins IT LeadershipStaff Management podcast TruStone tech execs share AI-driven credit union transformation Oct 1, 202522 mins CIO Leadership Live podcast The Tile Shop's CIO Christopher Davis on cloud migration, AI integration Sep 17, 202534 mins CIO Leadership Live podcast Why AI upskilling fails, and how tech leaders are fixing it | What IT Leaders Want, Ep. 11 Sep 12, 202528 mins CareersGenerative AI video TruStone tech execs share AI-driven credit union transformation Oct 1, 202522 mins CIO Leadership Live video How BeyondTrust detects privilege escalation and dark web threats Oct 1, 202511 mins Identity and Access ManagementNetwork SecurityZero Trust video The Tile Shop's CIO Christopher Davis on cloud migration, AI integration Sep 17, 202534 mins CIO Leadership Live