Researchers Bypass IE Protected Mode – OnMSFT.com
A new paper from researchers at Verizon Business identifies a method through which an attacker can bypass Internet Explorer Protected…
A new paper from researchers at Verizon Business identifies a method through which an attacker can bypass Internet Explorer Protected…
MXI Security's Stealth Zone is a bootable USB stick that runs Windows Embedded Standard 2009, allowing untrusted computers to be…
Michael Wolf: Most of the digerati remain skeptical about Microsoft's long journey to becoming a key player in the digital…
Control Phreak, which prevents toll fraud, now available from Wick Hill with Panasonic voice switch systems. Woking, Surrey: 3rd December,…
Federal authorities in the first-of-its-kind game-console–modding criminal trial abruptly dropped their prosecution here Thursday, “based on fairness and justice.” “The…
As browser-based exploits and specifically JavaScript malware have shouldered their way to the top of the list of threats, browser…
Royal Pingdom: Where do you think Apple’s iPhone is the most popular? Where does Nokia’s Symbian phones dominate? How is…
Adobe has introduced Flash Player 10.2 beta, which brings a variety of new features focused on improved video playback performance.…
A.J. Smith: Today, Karri Alexion-Tiernan posted a blog on the Windows For Your Business site about the value of User…
The European Commission has launched an investigation into Google after other search engines complained that the firm had abused its…
At Microsoft, Hewlett-Packard and IBM, investment in research and development is a reflection of corporate culture. This three-part piece examines…
Microsoft has engaged in talks with media companies for a new subscription-based online TV service, one which could allow consumers…