Twitter flood heralds Egypt’s return to the internet
A flood of celebratory and congratulatory tweets on Twitter has greeted the news that internet services have been restored in Egypt.
More results...
A flood of celebratory and congratulatory tweets on Twitter has greeted the news that internet services have been restored in Egypt.
Software quality would be much better if programmers adopted “literate programming”, according to Stanford University’s unique professor emeritus for the art of computer programming, Donald Knuth.
Software quality would be much better if programmers adopted “literate programming”, according to Stanford University’s unique professor emeritus for the art of computer programming, Donald Knuth.
Google and Twitter have joined forces to enable Egyptians to tweet using the phone to bypass a government-imposed internet blackout.
No matter which team you root for in the Super Bowl this Sunday, be careful of scams that might be lurking in your trash-talking tweets or other online communication, warns Mark Maciw, web product manager at Clearswift.
Researchers at North Carolina State University have discovered a flaw in the Android 2.3 Gingerbread mobile operating system that allows hackers to gain access to information on the phone’s microSD storage card.
Source code that apparently relates to v8 of Kaspersky anti-virus has appeared on BitTorrent and other file-sharing sites in the last few days. According to news wire reports, the source code was leaked by an employee of the IT security vendor who is n…
Research published today claims to show that the increasing problem of distributed denial of service (DDoS) attacks has been made worse by a tendency to misconfigure firewalls and intrusion prevention systems (IPS).
Privately held network communications supplier NewNet Communication has acquired another business from within its own parent company – secure transactions provider Traxcom Technologies. The move is expected to strengthen the security of NewNet’s mobile…
CyberArk has landed a prestigious project for protecting critical applications, identities and information in Belgacom’s data centres in Belgium.