Operation Byzantine Hades pulls 'terabytes' of sensitive data over half a decade of success
3.5 million records, including data more personal than an email address
There are so many categories of cloud computing and so many competing standards that users may not be able to move among them easily.
Don't be evil?
More than three quarters of U.S. companies virtualize at least some of their x86-based servers, but few get their full money's worth out of virtualization.
Cloud Girlfriend takes trend too far -- or scams users for email
How can your ISP count your packets if it doesn't know how to count?
A trio of researchers at the University of Illinois at Urbana-Champaign are trying to create a nanostructure design for batteries that would enable the rapid-recharge time.
Hint: You don't really know what hypervisors you're running, or what it all costs. Consider some expert advice on 6 common management mistakes.
Analysis: Grandiosity, self congratulation after Rustock takedown don't bode well for future "operations."
Analysis: Security study scrutinizes malware methods.
While mobile and smartphone security is the hot topic of the moment among virtualization security gurus, plenty of other virtualization security topics demand...
New algorithm can only help if your SEO strategy isn't sleazy