[caption id="attachment_17702" align="aligncenter" width="517"] 'Chameleon' attacks access points, takes over WLAN.[/caption] Researchers have demonstrated it's possible to create a computer virus that can infe…
A team of Australian researchers has developed a data-mining technique they claim is almost 100 percent effective at identifying potentially destructive flaws in security software. Zero-day exploits—which attac…
Crowdsourcing is the way of the future, argue some pundits. Why rely on trained analysts or a handful of elected officials, their logic goes, when you can obtain similar—if not better—results by opening a proce…
With great power comes great vulnerability. Google Android dominates the smartphone market, and it’s a solid contender in the realm of tablet operating systems. According to a recent report from Strategy Analyt…
It’s considering both in-house and external resources for the best fit for a variety of tasks. Rightsourcing considers in-house options and contractors to determine the most effective course of action. With rig…
Create Your Profile
Sign up for a free Dice profile, add your resume, discover great career insights and set your tech career in motion.