can

Fears grow that laser printers can seriously damage health

Fears grow that laser printers can seriously damage health

Some laser printers release tiny particles of toner-like material into the air that people can inhale deep into their lungs where they may pose a health hazard, scientists have warned..
Robert Jaques Aug 1 2007 7:07AM Hardware
Legal matters: IM can cause trouble later

Legal matters: IM can cause trouble later

Instant messaging should be treated like email, with similar constraints.
Tamzin Matthew Jul 27 2007 3:57PM Security
Case study: How a company can grow and still protect data

Case study: How a company can grow and still protect data

As a fast growing company that has developed its business around proprietary technologies, WebEx faced the same dilemma.
Randy Barr, Jun 15 2007 11:37AM Security
Flexible working can save the planet

Flexible working can save the planet

Flexible working can help save the planet by reducing greenhouse gas emissions, academics claimed today.
Robert Jaques May 17 2007 12:30PM Training & Development
Web can help combat obesity

Web can help combat obesity

The internet can help motivate couch potatoes to exercise, according to a US study.
Robert Jaques May 16 2007 11:25AM Oddware
Flaw in Windows can be exploited with malicious HLP files

Flaw in Windows can be exploited with malicious HLP files

Researchers have reported a new Microsoft vulnerability in Windows Help (HLP) files, coinciding with this week's Patch Tuesday release.
Frank Washkuch Apr 13 2007 9:42AM Security
10 ways to protect intellectual property

10 ways to protect intellectual property

Intellectual property (IP) assets are at the heart of businesses. Increasingly these assets are available in digital formats: Microsoft Word files, Excel spreadsheets etc, making them easy targets.
Ratinder Paul Feb 28 2007 3:21PM Security
Pretexting - white lies that can damage your company

Pretexting - white lies that can damage your company

In the wake of recent news at HP, pretexting has become the hot topic in the business world, and its sudden rise to fame broaches numerous questions including: What exactly is pretexting? How are companies liable for it? What are companies doing that is considered pretexting and how can they protect themselves from becoming the next HP?
Matt Leonard, Feb 19 2007 9:21AM Security
Nintendo Wii can 'keep you healthy'

Nintendo Wii can 'keep you healthy'

A Wii a day keeps the doctor away, Nintendo president hopes.
Simon Burns Dec 12 2006 9:46AM Hardware
Opinion: Remember: less can be more

Opinion: Remember: less can be more

Discussing the pros and cons of radio frequency identification (RFID), the technology that allows interaction between small chips and nearby readers without physical contact, is a surefire way to get a good argument going.
Nick Barron, Nov 13 2006 1:31PM Security
BEA: Component software can end vendor lock-in

BEA: Component software can end vendor lock-in

May the best function win.
Tom Sanders Sep 21 2006 9:58AM Software
VoIP: Can we talk?

VoIP: Can we talk?

VoIP cuts costs and streamlines communication for enterprises, but are the benefits worth the security risks? Dan Kaplan investigates.
Staff Writers Sep 4 2006 3:56PM Security
Can we talk?

Can we talk?

Ma Bell, meet your precocious newborn, Voice over Internet Protocol (VoIP). The technology, just a few years old, is growing up fast as enterprises and home users abandon traditional telephone lines so they can converge voice and data communication onto one network — while significantly cutting costs in the process.
Dan Kaplan Aug 8 2006 9:56PM Security
Debate: Can there be any justification for organisations monitoring their staff's email?

Debate: Can there be any justification for organisations monitoring their staff's email?

Mark Hughes Jul 12 2006 4:50PM Security
Only we can save the world wide web

Only we can save the world wide web

One of the delegates at the closed Executive Security Action Forum, held before the RSA conference this year, asked: "What will the internet look like – and will it even be there for our children?"
Paul Simmonds Jul 12 2006 2:35PM Security
What pill can I take for cyber insecurity?

What pill can I take for cyber insecurity?

Ahhhhh, the internet. We are hooked, and we better be prepared for the consequences. Real dollars are being lost, identities are being stolen, botnets are running rampant, consumer ATM cards are being compromised, spam is jamming our inboxes, the press is reporting stories that contribute to consumer cyber fears, and mankind again finds itself waging a protracted war — this time against internet insecurity.
Kevin Mandia Jul 6 2006 8:31PM Security
New PoC malware can infect both Windows and Linux

New PoC malware can infect both Windows and Linux

Kaspersky Lab today reported a new proof-of-concept (PoC) cross-platform virus that creates malicious code to infect both Linux and Microsoft Windows operating systems.
Frank Washkuch Apr 7 2006 6:04PM Security
New PoC virus can infect both Windows and Linux

New PoC virus can infect both Windows and Linux

Kaspersky Lab today reported a new proof of concept (PoC) cross-platform virus that creates malicious code to infect both Linux and Microsoft Windows operating systems.
Frank Washkuch Apr 7 2006 6:02PM Security
Industry finally begins to can the spam

Industry finally begins to can the spam

The volume of spam messages per consumer is set to decrease 13 percent every year through 2010, as ISPs tackle the spam issue through improved filtering technology, industry analysts have predicted.
William Eazel Feb 6 2006 10:17AM Security
It can be better to be needed than wanted

It can be better to be needed than wanted

Ron Condon Jan 25 2006 4:19PM Security

Log In

  |  Forgot your password?