Video, music and books are still important, but partnerships are the way forward for Samsung
New APIs make it easier it to communicate with apps running on Android-based wearables.
But a spokeswoman said one of its main domains used for its services isn't available
Fraudsters modified payment invoices called boletos using sophisticated malicious software, RSA said
Achieving solid adoption of these 'Facebook-for-work' tools takes planning, vision, training and effort
The company joins quest to ensure interoperability as more devices become connected
The project plans to implement code reviews, fix poor coding and have better documentation
No-IP claims Microsoft doesn't appear to be very good at DNS
A variety of other sophisticated hacking campaigns used No-IP's infrastructure
The product is expected to be announced at VMworld in August
Previously, users granted edit rights by default to the colleagues with whom they shared folders
The consumer webmail and cloud storage services will now be protected with new encryption.
The company's new T2 instances offer the ability to increase performance as long as you have the credit
The HTC smartphone has the looks, but Samsung is hoping a svelte design and an abundance of sensors will be a winning recipe
Symantec says the Dragonfly campaign, originating in Eastern Europe, sought to gain persistent access to energy suppliers