More from The Register
Samsung takes Google into third dimension of flashy storage
Flash-flood: Korean 3D flash-furtler melts heart of the Chocolate Factory
Never mind Samsung, GOOGLE will EAVESDROP as you browse on Chrome
Voice Search extension project described as 'Ear of Sauron'
Dixons Carphone clings to EE, Three in Phones 4U bullet dodge
Analysis Rush of deals will insulate firm from collapse - it hopes
Intel shows Google how to stick it real good
Chipzilla sticks it to Chromebit with Atom-powered Compute Stick
Cyber security best practices in financial services
This paper explores and explains how to innovate without fear, while protecting your most valuable assets: your data.
Demand-driven application control: assuring application performance
The evolution of enterprise applications, the data centers in which they reside and the increasing expectations of businesses and end-users on the Quality of Service delivered.
Dangers of the deep, dark web
A high-level overview of two mainstream networks in the Deep Web: Tor or .onion sites and I2P. There are other, similar anonymous networks, but these are the two most used.
The changing face of hacking
Helping you learn more about hackers and how they work. And that can help you better plan and deploy your own defenses.