Solar storms are raging, how will the impact Earth?
Stories by Michael Cooney
As the iPad third-generation is launched, we look at the iPad as a cultural phenomenon
Spanish telecom firm, Telefonica, built a robot to digitally image and look for problems with Pablo Picasso's famous 'Guernica' painting.
Big Boys Toys exhibition tempts your inner child
Garry Kasparov battled IBM's Deep Blue 16 years ago in February, but that was just the beginning
The idea that <a href="http://www.aclu.org/blog/technology-and-liberty/facebook-twitter-and-dhs-which-one-these-things-not-others">any number of federal institutions are watching</a> your every move on social networks like Facebook, Twitter is unnerving at best. T<a href="http://www.networkworld.com/community/blog/dhs-looking-bolster-drone-security-surveillance-system">he Department of Homeland Security</a> is one of those agencies and today it testified before a House subcommittee to define and defend its role in social media monitoring.
Massive machine was world's first large-scale electronic general-purpose digital computer ... here's a pictorial tribute
A former <a href="http://www.networkworld.com/community/blog/does-irs-need-more-options-fight-identity-the">Internal Revenue Service</a> employee this week got 105 months in prison for pleading guilty to theft of government property and aggravated identity theft in a case where the guy tried to get away with nearly $8 million in fraudulent tax returns.
The Federal Trade Commission this week said it sent letters to six unidentified <a href="http://www.networkworld.com/news/2012/020712-mobile-webstats-255804.html">mobile</a> <a href="http://www.networkworld.com/topics/applications.html">applications</a> makers warning them that their <a href="http://www.networkworld.com/community/blog/us-supreme-court-says-nasa-background-securit">background screening apps</a> may be violating federal statutes.
The <a href="http://www.networkworld.com/community/blog/has-high-tech-helped-or-hurt-crime-fighting-doj-wants-know">Department of Justice</a> today said a man who sent malicious code to Marriott International Corporation, threatening to reveal confidential information taken from the company's computers if Marriott did not offer him a job, has been sent to prison for his criminal endeavor.
The Internal Revenue Service and the Department of Justice teamed up for a coast-to-coast crackdown on <a href="http://www.networkworld.com/community/blog/fbi-internet-crime-high-types-misdeeds-changi">identity thieves</a> this week.
Hard to imagine but it has been 58 years since IBM and Georgetown University teamed up to run what they said was at the time the first English-to-Russian language computer translation program.
There are a <a href="http://www.networkworld.com/community/blog/who-really-sets-global-cybersecurity-standard">ton of groups</a> out there that offer <a href="http://www.networkworld.com/community/node/62089">cybersecurty</a> help and guidance, the trick, it seems is finding he right one for you organization.
The watchdogs at the Government Accountability Office this week issued a report that takes a look at what information, or guidance as they call it, is available to help government agencies and public sector companies bulk up their cybersecurity efforts.
So long as people click on <a href="http://www.networkworld.com/news/2011/081611-fbi-car-scam-249787.html">unsolicited attachments in email</a>, scammers will invent new ways to take their money, identities and more.