After bundling it with Office 365 Enterprise plans, Microsoft is now adding it to school and midsize business editions.
Joshua Rogers' case illustrates the fine legal line computer security researchers tread
Invisible.im aims to allow people to have online chats but leave little digital forensic evidence
Although unverified, the code indicates a broad effort to monitor those interested in protecting their online activities
Demand for real-time threat monitoring from cloud services providers is rising as hacking risks persist
Video, music and books are still important, but partnerships are the way forward for Samsung
New APIs make it easier it to communicate with apps running on Android-based wearables.
But a spokeswoman said one of its main domains used for its services isn't available
Fraudsters modified payment invoices called boletos using sophisticated malicious software, RSA said
Achieving solid adoption of these 'Facebook-for-work' tools takes planning, vision, training and effort
The company joins quest to ensure interoperability as more devices become connected
The project plans to implement code reviews, fix poor coding and have better documentation
No-IP claims Microsoft doesn't appear to be very good at DNS
A variety of other sophisticated hacking campaigns used No-IP's infrastructure
The product is expected to be announced at VMworld in August