[caption id="attachment_17702" align="aligncenter" width="517"] 'Chameleon' attacks access points, takes over WLAN.[/caption] Researchers have demonstrated it's possible to create a computer virus that can infe…
A team of Australian researchers has developed a data-mining technique they claim is almost 100 percent effective at identifying potentially destructive flaws in security software. Zero-day exploits—which attac…
Crowdsourcing is the way of the future, argue some pundits. Why rely on trained analysts or a handful of elected officials, their logic goes, when you can obtain similar—if not better—results by opening a proce…
With great power comes great vulnerability. Google Android dominates the smartphone market, and it’s a solid contender in the realm of tablet operating systems. According to a recent report from Strategy Analyt…
We’re all familiar with the so-called Work-Life Balance. But, this conjures up visions of see-saws that must be perfectly balanced with equal weights on both ends at all times to ensure success. I personally be…
Create Your Profile
Sign up for a free Dice profile, add your resume, discover great career insights and set your tech career in motion.