The new IBM security chip holds a user password to access a desktop or laptop computer. The chip is then embedded into the client motherboard, making direct access to the machine by a hacker or malicious...
Researchers used earlier observations from NASA's MESSENGER mission to probe Mercury's inner core
Espionage campaign has compromised the websites of more than 40 organisations over the past two years
Wedlake Bell's James Castro-Edwards explains why Bounty received such a big fine under the old Data Protection Act - which would almost certainly have been much larger under GDPR
Big changes are under way at SAP, and HANA's weaknesses may be the root cause