Ajax loader
By using our website, you agree to our use of cookies as described in Cookie Policy.

Can't find what you're looking for?

 

Be sure to Sign in to see all available content.

 

If you don't have an account, Register here.

Search results for: Computer-expert

GLOBAL-COMPUTERS/
RTS1GS1A
October 17, 2017
A man checks the power lines on a motherboard of a laptop at a repair center in Colombo, Sri Lanka October...
Colombo, Sri Lanka
A man checks the power lines on a motherboard of a laptop at a repair center in Colombo
A man checks the power lines on a motherboard of a laptop at a repair center in Colombo, Sri Lanka October 17, 2017. REUTERS/Dinuka Liyanawatte
CYBER-ATTACK/
RTX35OS3
May 13, 2017
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on...
Warsaw, Poland
Man holds laptop computer as cyber code is projected on him in this illustration picture
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration
CYBER-ATTACK/
RTX35OS1
May 13, 2017
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on...
Warsaw, Poland
Man holds laptop computer as cyber code is projected on him in this illustration picture
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration
CYBER-ATTACK/
RTX35OS0
May 13, 2017
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on...
Warsaw, Poland
Man holds laptop computer as cyber code is projected on him in this illustration picture
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration
CYBER-ATTACK/
RTX35ORW
May 13, 2017
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken...
Warsaw, Poland
Hooded man holds laptop computer as cyber code is projected on him in this illustration picture
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration
CYBER-ATTACK/
RTX35ORT
May 13, 2017
A projection of cyber code on a hooded man is pictured in this illustration picture taken on May 13,...
Warsaw, Poland
Projection of cyber code on hooded man is pictured in this illustration picture
A projection of cyber code on a hooded man is pictured in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration TPX IMAGES OF THE DAY
APPLE-DEVELOPERS/
RTX2G1OT
June 13, 2016
A group of young developers stand for a group photo on stage during the Apple World Wide Developers Conference...
San Francisco, UNITED STATES
A group of young developers stand for a group photo on stage during the Apple World Wide Developers Conference...
A group of young developers stand for a group photo on stage during the Apple World Wide Developers Conference in San Francisco, California, U.S., June 13, 2016. REUTERS/Stephen Lam TPX IMAGES OF THE DAY
PANAMA-TAX/AUSTRALIA-SOFTWARE
RTSDN0S
April 05, 2016
An employee of software company Nuix stands in their office located in central Sydney, Australia, April...
Sydney, Australia
An employee of software company Nuix stands in their office located in central Sydney, Australia
An employee of software company Nuix stands in their office located in central Sydney, Australia, April 5, 2016. Software produced by the little-known Australian developer has helped journalists piece together news leads from the mountains of data found in the contents of the Panama Papers, one of the biggest document leaks in history. Sydney-based Nuix Pty Ltd donated its document analysis programme to the International Consortium of Investigative Journalists (ICIJ) to sift through the millions of leaked documents from Panamanian law firm Mossack Fonseca. REUTERS/David Gray
PANAMA-TAX/AUSTRALIA-SOFTWARE
RTSDN0R
April 05, 2016
Employees of software company Nuix sit in their office located in central Sydney, Australia, April 5,...
Sydney, Australia
Employees of software company Nuix sit in their office located in central Sydney, Australia
Employees of software company Nuix sit in their office located in central Sydney, Australia, April 5, 2016. Software produced by the little-known Australian developer has helped journalists piece together news leads from the mountains of data found in the contents of the Panama Papers, one of the biggest document leaks in history. Sydney-based Nuix Pty Ltd donated its document analysis programme to the International Consortium of Investigative Journalists (ICIJ) to sift through the millions of leaked documents from Panamanian law firm Mossack Fonseca. REUTERS/David Gray
ONEVIEW-AUSTRALIA/IPO
RTSAT4P
March 17, 2016
Irish health software maker Oneview's Chief Executive Officer James Fitter (L) and founder and executive...
Sydney, Australia
Irish health software maker Oneview's Chief Executive Officer Fitter and founder and executive director...
Irish health software maker Oneview's Chief Executive Officer James Fitter (L) and founder and executive director Mark McCloskey react after they broke the rope ringing the bell at the Australian Securities Exchange during the official listing ceremony in Sydney, Australia, March 17, 2016. REUTERS/David Gray
ONEVIEW-AUSTRALIA/IPO
RTSAT4O
March 17, 2016
Irish health software maker Oneview's Chief Executive Officer James Fitter (L) and founder and executive...
Sydney, Australia
Irish health software maker Oneview's Chief Executive Officer Fitter and founder and executive director...
Irish health software maker Oneview's Chief Executive Officer James Fitter (L) and founder and executive director Mark McCloskey react after they broke the rope ringing the bell at the Australian Securities Exchange during the official listing ceremony in Sydney, Australia, March 17, 2016. REUTERS/David Gray
NIGERIA-TECHNOLOGY/YABA
RTX1M6M3
July 28, 2015
Software developers work at the Information Technology Developers Entrepreneurship Accelerator (iDEA)...
Lagos, Nigeria
Software developers work at the iDEA hub in the Yaba district in Lagos
Software developers work at the Information Technology Developers Entrepreneurship Accelerator (iDEA) hub in the Yaba district in Lagos June 25, 2015. At first glance, Yaba is like many other parts of Nigeria's sprawling commercial capital: a cacophony of car horns and shouting street vendors, mingling with exhaust fumes and the occasional stench of sewage. But in between the run-down buildings in this seemingly inauspicious part of Lagos, a city of around 21 million, tech start-ups are taking root and creating a buzz that is drawing international venture capitalists and more established digital firms. Picture taken June 25, 2015. REUTERS/Akintunde Akinleye
NIGERIA-TECHNOLOGY/YABA
RTX1M6M2
July 28, 2015
Software developers work on computer sytems at the Information Technology Developers Entrepreneurship...
Lagos, Nigeria
Software developers work on computer sytems at the iDEA hub in the Yaba district in Lagos
Software developers work on computer sytems at the Information Technology Developers Entrepreneurship Accelerator (iDEA) hub in the Yaba district in Lagos June 25, 2015. At first glance, Yaba is like many other parts of Nigeria's sprawling commercial capital: a cacophony of car horns and shouting street vendors, mingling with exhaust fumes and the occasional stench of sewage. But in between the run-down buildings in this seemingly inauspicious part of Lagos, a city of around 21 million, tech start-ups are taking root and creating a buzz that is drawing international venture capitalists and more established digital firms. Picture taken June 25, 2015. REUTERS/Akintunde Akinleye
ISRAEL-ARCHAEOLOGY/
RTX1L38T
July 20, 2015
Writings, believed to be ancient Hebrew script from the bible, is displayed on a computer screen at the...
Jerusalem, Israel
Writing, believed to be ancient Hebrew script from the bible is displayed in Jerusalem
Writings, believed to be ancient Hebrew script from the bible, is displayed on a computer screen at the Israel Museum in Jerusalem July 20, 2015. Israeli archaeologists said on Monday they had discerned the biblical writing on a 1,500 year old scroll they deemed the oldest biblical text found since the Dead Sea Scrolls. Using micro C-T scanning and virtual mapping techniques scientists last week discerned an ancient Hebrew script of what experts say are the first eight verses of the bible's old testament book of Leviticus, a curator at the Israel Antiquities Authority said. REUTERS/Amir Cohen
MIDEAST-PALESTINIANS/TECHNOLOGY
RTR4MAFD
January 21, 2015
Palestinian employees process data on their laptops at Unit One in Gaza City January 15, 2015. In nine...
Gaza City, Palestinian Territories
Palestinian employees process data on their laptops at Unit One in Gaza City
Palestinian employees process data on their laptops at Unit One in Gaza City January 15, 2015. In nine years, Gaza-based IT entrepreneur Saady Lozon and his partner Ahmed Abu Shaban have transformed their firm, Unit One, from a tiny outfit in a single room in the blockaded Gaza Strip into a successful business with clients in Europe, the United States and the Arab world. They can't leave Gaza easily, but they can develop applications for Web and mobile devices online and provide international clients with data-management services, competing with firms in India and elsewhere. Picture taken January 15, 2015. To match story MIDEAST-PALESTINIANS/TECHNOLOGY REUTERS/Mohammed Salem (GAZA - Tags: SCIENCE TECHNOLOGY BUSINESS)
BRITAIN-POLITICS/
RTR4H3YS
December 08, 2014
Britain's Prime Minister David Cameron sits on the floor as he joins students for "An Hour of Coding"...
London, United Kingdom
Britain's Prime Minister David Cameron sits on the floor as he joins students for "An Hour of Coding"...
Britain's Prime Minister David Cameron sits on the floor as he joins students for "An Hour of Coding" at Number 10 Downing Street in London December 8, 2014. REUTERS/Stefan Rousseau/pool (BRITAIN - Tags: POLITICS SCIENCE TECHNOLOGY EDUCATION TPX IMAGES OF THE DAY)
COLOMBIA-REBELS/VIDEOGAMES
RTR45E18
September 08, 2014
Colombian systems programmer Juan Pico works on the video game "Adios a las Armas" (Farewell to Arms)...
Bogota, Colombia
Colombian systems programmer Juan Pico works on the video game "Adios a las Armas" (Farewell to Arms)...
Colombian systems programmer Juan Pico works on the video game "Adios a las Armas" (Farewell to Arms) in Bogota September 4, 2014. Colombians will soon be able to sit around a virtual negotiating table as Marxist FARC rebels or the government to thrash out an end to 50 years of war in a video game mirroring complex real life talks now under way to restore peace to the country. "Adios a las Armas," or "Farewell to Arms," a finalist in a government competition in July for non-violent video games, aims to raise awareness about a peace deal being negotiated in Cuba which voters will back or reject in a referendum. Picture taken September 4, 2014. REUTERS/Jose Miguel Gomez (COLOMBIA - Tags: CONFLICT SOCIETY)
COLOMBIA-REBELS/VIDEOGAMES
RTR45E13
September 08, 2014
Colombian systems programmer Camilo Paez works on the video game "Adios a las Armas" (Farewell to Arms)...
Bogota, Colombia
Colombian systems programmer Camilo Paez works on the video game "Adios a las Armas" (Farewell to Arms)...
Colombian systems programmer Camilo Paez works on the video game "Adios a las Armas" (Farewell to Arms) in Bogota September 4, 2014. Colombians will soon be able to sit around a virtual negotiating table as Marxist FARC rebels or the government to thrash out an end to 50 years of war in a video game mirroring complex real life talks now under way to restore peace to the country."Adios a las Armas," or "Farewell to Arms," a finalist in a government competition in July for non-violent video games, aims to raise awareness about a peace deal being negotiated in Cuba which voters will back or reject in a referendum. Picture taken September 4, 2014. REUTERS/Jose Miguel Gomez (COLOMBIA - Tags: CONFLICT SOCIETY)
CYBERSECURITY-HACKING/
RTR41HX3
August 06, 2014
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker...
Las Vegas, UNITED STATES
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker...
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS)
CYBERSECURITY-HACKING/
RTR41HX1
August 06, 2014
An image of Chinese military officer Sun Kailiang is displayed as computer security expert Mikko Hypponen...
Las Vegas, UNITED STATES
An image of Chinese military officer Sun Kailiang is displayed as computer security expert Hypponen of...
An image of Chinese military officer Sun Kailiang is displayed as computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during a briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. Sun Kailiang is one of five Chinese military officers accused of hacking into American companies. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY CRIME LAW POLITICS BUSINESS)
CYBERSECURITY-HACKING/
RTR41HWI
August 06, 2014
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next...
Las Vegas, UNITED STATES
Computer security expert Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation"...
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS)
CYBERSECURITY-HACKING/
RTR41HWH
August 06, 2014
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next...
Las Vegas, UNITED STATES
Computer security expert Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation"...
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS)
CYBERSECURITY-HACKING/
RTR41HWG
August 06, 2014
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next...
Las Vegas, UNITED STATES
Computer security expert Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation"...
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS)
FRANCE/
RTX15V1R
November 27, 2013
A combination picture shows Millenium eSport professional gamers looking at their computer screens inside...
Marseille, France
A combination picture shows Millenium eSport professional gamers looking at their computer screens inside...
A combination picture shows Millenium eSport professional gamers looking at their computer screens inside the Millenium Gaming House in Marseille November 12, 2013. The Millenium Gaming House, which opened its doors in Marseille in 2011, is the most important French e-sport organization and houses pro gamers who live, game, eat and sleep full-time in the building. The house is dedicated to the training of Pro Gamers teams for International competitions. Players train long hours to master the difficulties and subtleties of only one game and participate in Lan-Parties around the world. E-Sports earnings has ranked the 100 players with the highest overall earnings from competitive gaming, with over 60 gamers who have earned over $100,000 in prize money. Picture taken November 12, 2013. REUTERS/Jean-Paul Pelissier (FRANCE - Tags: BUSINESS ENTERTAINMENT SCIENCE TECHNOLOGY SOCIETY TPX IMAGES OF THE DAY)
FRANCE/
RTX15V1C
November 27, 2013
Millenium eSport professional gamer Arif of France, nicknamed Doigby, looks at a computer screen as he...
Marseille, France
Millenium eSport professional gamer Arif of France, nicknamed Doigby, looks at a computer screen as he...
Millenium eSport professional gamer Arif of France, nicknamed Doigby, looks at a computer screen as he plays inside the Millenium Gaming House in Marseille Novembre 15, 2013. The Millenium Gaming House, which opened its doors in Marseille in 2011, is the most important French e-sport organization and houses pro gamers who live, game, eat and sleep full-time in the building. The house is dedicated to the training of Pro Gamers teams for International competitions. Players train long hours to master the difficulties and subtleties of only one game and participate in Lan-Parties around the world. E-Sports earnings has ranked the 100 players with the highest overall earnings from competitive gaming, with over 60 gamers who have earned over $100,000 in prize money. Picture taken November 15, 2013. REUTERS/Jean-Paul Pelissier (FRANCE - Tags: BUSINESS ENTERTAINMENT SCIENCE TECHNOLOGY SOCIETY)
MICROSOFT-CYBERCRIME/
RTX15DDA
November 14, 2013
A sign is pictured in the hallway of the Microsoft Cybercrime Center, the new headquarters of the Microsoft...
Redmond, UNITED STATES
A sign is pictured in the hallway of the Microsoft Cybercrime Center, the new headquarters of the Microsoft...
A sign is pictured in the hallway of the Microsoft Cybercrime Center, the new headquarters of the Microsoft Digital Crimes Unit, in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW)
MICROSOFT-CYBERCRIME/
RTX15DD7
November 14, 2013
A malware lab is pictured inside the Microsoft Cybercrime Center, the new headquarters of the Microsoft...
Redmond, UNITED STATES
A malware lab is pictured inside the Microsoft Cybercrime Center, the new headquarters of the Microsoft...
A malware lab is pictured inside the Microsoft Cybercrime Center, the new headquarters of the Microsoft Digital Crimes Unit, in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW)
MICROSOFT-CYBERCRIME/
RTX15DD6
November 14, 2013
Richard Boscovich, assistant general council for the Microsoft Digital Crimes Unit, talks about their...
Redmond, UNITED STATES
Richard Boscovich, assistant general council for the Microsoft Digital Crimes Unit, talks about their...
Richard Boscovich, assistant general council for the Microsoft Digital Crimes Unit, talks about their work at the Microsoft Cybercrime Center, the unit's new headquarters in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW)
MICROSOFT-CYBERCRIME/
RTX15DD3
November 14, 2013
The forensics lab's evidence room is pictured inside the Microsoft Cybercrime Center, the new headquarters...
Redmond, UNITED STATES
The forensics lab's evidence room is pictured inside the Microsoft Cybercrime Center, the new headquarters...
The forensics lab's evidence room is pictured inside the Microsoft Cybercrime Center, the new headquarters of the Microsoft Digital Crimes Unit, in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW)
MICROSOFT-CYBERCRIME/
RTX15DD0
November 14, 2013
Bruce Hembree, security operations employee at the Microsoft Digital Crimes Unit, talks about the Malware...
Redmond, UNITED STATES
Bruce Hembree, security operations employee at the Microsoft Digital Crimes Unit, talks about the Malware...
Bruce Hembree, security operations employee at the Microsoft Digital Crimes Unit, talks about the Malware Lab during a tour at the Microsoft Cybercrime Center in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW)
MICROSOFT-CYBERCRIME/
RTX15DCX
November 14, 2013
Vishant Patel, senior manager of investigations at the Microsoft Digital Crimes Unit, works in the unit's...
Redmond, UNITED STATES
Vishant Patel, senior manager of investigations at the Microsoft Digital Crimes Unit, works in the unit's...
Vishant Patel, senior manager of investigations at the Microsoft Digital Crimes Unit, works in the unit's Malware Lab at the Microsoft Cybercrime Center in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW)
MICROSOFT-CYBERCRIME/
RTX15DCU
November 14, 2013
Vishant Patel (2nd L), senior manager of investigations at the Microsoft Digital Crimes Unit, works in...
Redmond, UNITED STATES
Vishant Patel, senior manager of investigations at the Microsoft Digital Crimes Unit, works in the unit's...
Vishant Patel (2nd L), senior manager of investigations at the Microsoft Digital Crimes Unit, works in the unit's Malware Lab as Associate General Counsel David Finn (R), Security Operations employee Bruce Hembree (L) are reflected in a glass window while giving a tour at the Microsoft Cybercrime Center in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW)
MICROSOFT-CYBERCRIME/
RTX15DCQ
November 14, 2013
David Finn, associate general counsel for the Microsoft Digital Crimes Unit, gives a tour of the unit's...
Redmond, UNITED STATES
David Finn, associate general counsel for the Microsoft Digital Crimes Unit, gives a tour of the unit's...
David Finn, associate general counsel for the Microsoft Digital Crimes Unit, gives a tour of the unit's new headquarters at the Microsoft Cybercrime Center in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW)
MICROSOFT-CYBERCRIME/
RTX15DCP
November 14, 2013
Vishant Patel, senior manager of investigations at the Microsoft Digital Crimes Unit, shows a heat map...
Redmond, UNITED STATES
Vishant Patel, senior manager of investigations at the Microsoft Digital Crimes Unit, shows a heat map...
Vishant Patel, senior manager of investigations at the Microsoft Digital Crimes Unit, shows a heat map and talks about how malicious computer networks known as the Citadel Botnets attack computers in Western Europe at the Microsoft Cybercrime Center in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW)
MICROSOFT-CYBERCRIME/
RTX15DCK
November 14, 2013
Peter Anaman, Microsoft Digital Crimes Unit's director of online piracy, gives an interview at the unit's...
Redmond, UNITED STATES
Peter Anaman, Microsoft Digital Crimes Unit's director of online piracy, gives an interview at the unit's...
Peter Anaman, Microsoft Digital Crimes Unit's director of online piracy, gives an interview at the unit's new headquarters in the Microsoft Cybercrime Center in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW)
MICROSOFT-CYBERCRIME/
RTX15DCD
November 14, 2013
Richard Boscovich, assistant general council for the Microsoft Digital Crimes Unit, gives an interview...
Redmond, UNITED STATES
Richard Boscovich, assistant general council for the Microsoft Digital Crimes Unit, gives an interview...
Richard Boscovich, assistant general council for the Microsoft Digital Crimes Unit, gives an interview at the Microsoft Cybercrime Center, the unit's new headquarters in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW)
MICROSOFT-CYBERCRIME/
RTX15D54
November 14, 2013
The forensics lab at Microsoft's Cybercrime Center, the new headquarters of the Microsoft Digital Crimes...
Redmond, UNITED STATES
The forensics lab at Microsoft's Cybercrime Center, the new headquarters of the Microsoft Digital Crimes...
The forensics lab at Microsoft's Cybercrime Center, the new headquarters of the Microsoft Digital Crimes Unit, in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW)
MICROSOFT-CYBERCRIME/
RTX15D51
November 14, 2013
Microsoft Digital Crimes Unit chief David Finn gives a tour of the unit's new headquarters at the Microsoft...
Redmond, UNITED STATES
Microsoft Digital Crimes Unit chief David Finn gives a tour of the unit's new headquarters at the Microsoft...
Microsoft Digital Crimes Unit chief David Finn gives a tour of the unit's new headquarters at the Microsoft Cybercrime Center in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW)
MICROSOFT-CYBERCRIME/
RTX15D4T
November 14, 2013
A sign is pictured in the hallway of the Microsoft Cybercrime Center, the new headquarters of the Microsoft...
Redmond, UNITED STATES
A sign is pictured in the hallway of the Microsoft Cybercrime Center in Redmond, Washington
A sign is pictured in the hallway of the Microsoft Cybercrime Center, the new headquarters of the Microsoft Digital Crimes Unit, in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW)
USA-HEALTHCARE/TECHNOLOGY
RTR3FIWS
October 02, 2013
Certified Application Counselor Gina Denis (C) takes information from Rose Valbrun (L) and William Merisier,...
Miami, UNITED STATES
A Certified Application Counselor takes information about Affordable Care Act insurance in Miami
Certified Application Counselor Gina Denis (C) takes information from Rose Valbrun (L) and William Merisier, both of Miami, about Affordable Care Act insurance, known as Obamacare, at the Borinquen Medical Center in Miami, Florida October 2, 2013. Counselors were still not able to enroll interested people using the online system. Technology experts and government officials were stumped about the reasons for the computer glitches plaguing the Obama administration's launch of new health insurance exchanges. They variously blamed an unexpected deluge of customers and outright errors that information technology (IT) teams labored throughout the day to fix. REUTERS/Joe Skipper (UNITED STATES - Tags: HEALTH POLITICS)
USA-HEALTHCARE/TECHNOLOGY
RTR3FIW6
October 02, 2013
Certified Application Counselor Gina Denis (L) takes information from Rose Valbrun (R) and William Merisier,...
Miami, UNITED STATES
A Certified Application Counselor takes information about Affordable Care Act insurance in Miami
Certified Application Counselor Gina Denis (L) takes information from Rose Valbrun (R) and William Merisier, both of Miami, about Affordable Care Act insurance, known as Obamacare, at the Borinquen Medical Center in Miami, Florida October 2, 2013. Counselors were still not able to enroll interested people using the online system. Technology experts and government officials were stumped about the reasons for the computer glitches plaguing the Obama administration's launch of new health insurance exchanges. They variously blamed an unexpected deluge of customers and outright errors that information technology (IT) teams labored throughout the day to fix. REUTERS/Joe Skipper (UNITED STATES - Tags: HEALTH POLITICS BUSINESS)
USA-HEALTHCARE/TECHNOLOGY
RTR3FIVN
October 02, 2013
A busy screen is shown on the laptop of a Certified Application Counselor as he attempted to enroll an...
Miami, UNITED STATES
A busy screen is shown on the laptop of a Certified Application Counselor as he attempted to enroll an...
A busy screen is shown on the laptop of a Certified Application Counselor as he attempted to enroll an interested person for Affordable Care Act insurance, known as Obamacare, at the Borinquen Medical Center in Miami, Florida October 2, 2013. Counselors were still not able to enroll interested people using the online system. Technology experts and government officials were stumped about the reasons for the computer glitches plaguing the Obama administration's launch of new health insurance exchanges. They variously blamed an unexpected deluge of customers and outright errors that information technology (IT) teams labored throughout the day to fix. REUTERS/Joe Skipper (UNITED STATES - Tags: HEALTH POLITICS)
USA-HEALTHCARE/TECHNOLOGY
RTR3FIVJ
October 02, 2013
Ricardo Mola (R) of Miami speaks with Certified Application Counselor Jason Connor after unsuccessfully...
Miami, UNITED STATES
Mola of Miami speaks with Connor after unsuccessfully trying to enroll for Affordable Care Act insurance,...
Ricardo Mola (R) of Miami speaks with Certified Application Counselor Jason Connor after unsuccessfully trying to enroll for Affordable Care Act insurance, known as Obamacare, at the Borinquen Medical Center in Miami, Florida October 2, 2013. Technology experts and government officials were stumped about the reasons for the computer glitches plaguing the Obama administration's launch of new health insurance exchanges. They variously blamed an unexpected deluge of customers and outright errors that information technology (IT) teams labored throughout the day to fix. REUTERS/Joe Skipper (UNITED STATES - Tags: HEALTH POLITICS)
USA-HEALTHCARE/TECHNOLOGY
RTR3FIV9
October 02, 2013
Visitors wait to speak with Certified Application Counselors about Affordable Care Act insurance, known...
Miami, UNITED STATES
Visitors wait to speak with Certified Application Counselors about Affordable Care Act insurance, known...
Visitors wait to speak with Certified Application Counselors about Affordable Care Act insurance, known as Obamacare, at the Borinquen Medical Center in Miami, Florida October 2, 2013. Counselors were still not able to enroll interested people using the online system. Technology experts and government officials were stumped about the reasons for the computer glitches plaguing the Obama administration's launch of new health insurance exchanges . They variously blamed an unexpected deluge of customers and outright errors that information technology (IT) teams labored throughout the day to fix. REUTERS/Joe Skipper (UNITED STATES - Tags: HEALTH POLITICS)
US-USA-HEALTHCARE
RTR3FIV5
October 02, 2013
Visitors speak with Certified Application Counselors about Affordable Care Act insurance, known as Obamacare,...
Miami, UNITED STATES
Visitors speak with Certified Application Counselors about Affordable Care Act insurance, known as Obamacare,...
Visitors speak with Certified Application Counselors about Affordable Care Act insurance, known as Obamacare, at the Borinquen Medical Center in Miami, Florida October 2, 2013. Counselors were still not able to enroll interested people using the online system. Technology experts and government officials were stumped about the reasons for the computer glitches plaguing the Obama administration's launch of new health insurance exchanges . They variously blamed an unexpected deluge of customers and outright errors that information technology (IT) teams labored throughout the day to fix. REUTERS/Joe Skipper (UNITED STATES - Tags: HEALTH POLITICS)
USA-HEALTHCARE/TECHNOLOGY
RTR3FIV0
October 02, 2013
Ricardo Mola of Miami speaks with Certified Application Counselor Jason Connor after unsuccessfully trying...
Miami, UNITED STATES
Mola speaks with Certified Application Counselor Connor after unsuccessfully trying to enroll for Affordable...
Ricardo Mola of Miami speaks with Certified Application Counselor Jason Connor after unsuccessfully trying to enroll for Affordable Care Act insurance, known as Obamacare, at the Borinquen Medical Center in Miami, Florida October 2, 2013. Counselors were still not able to enroll interested people using the online system. Technology experts and government officials were stumped about the reasons for the computer glitches plaguing the Obama administration's launch of new health insurance exchanges . They variously blamed an unexpected deluge of customers and outright errors that information technology (IT) teams labored throughout the day to fix. REUTERS/Joe Skipper (UNITED STATES - Tags: HEALTH POLITICS)
AUSTRALIA-GEEKS/MINERS
RTX10YI8
June 23, 2013
Naked "Ninja Boxes" are tested at the Ninja Blocks office in Sydney May 31, 2013. A group of industry...
Sydney, Australia
Naked "Ninja Boxes" are tested at the Ninja Blocks office in Sydney
Naked "Ninja Boxes" are tested at the Ninja Blocks office in Sydney May 31, 2013. A group of industry leaders, including the Atlassian duo, recently formed Blackbird Ventures to invest A$20 million in Australian start-ups that have the potential to be global success stories. Blackbird has so far invested in online design platform Canva and Ninja Blocks, a software developer bringing the remote controlled home to the masses by connecting home devices to web and mobile apps. Picture taken May 31, 2013. To match story AUSTRALIA-GEEKS/MINERS REUTERS/Daniel Munoz (AUSTRALIA - Tags: BUSINESS SCIENCE TECHNOLOGY COMMODITIES)
USA-WIKILEAKS/MANNING
RTX10J22
June 10, 2013
U.S. Army Private First Class Bradley Manning (L) departs the courtroom after day four of his court martial...
FT MEADE, UNITED STATES
U.S. Army Private First Class Bradley Manning departs the courtroom after day four of his court martial...
U.S. Army Private First Class Bradley Manning (L) departs the courtroom after day four of his court martial at Fort Meade, Maryland June 10, 2013. Computer forensic experts testified on Monday that they traced a break-in to a secret U.S. government website to Manning, the U.S. soldier charged with the biggest leak of classified files in the nation's history. REUTERS/Gary Cameron (UNITED STATES - Tags: MILITARY CRIME LAW POLITICS)
USA-WIKILEAKS/MANNING
RTX10J21
June 10, 2013
U.S. Army Private First Class Bradley Manning (L) departs the courtroom after day four of his court martial...
FT MEADE, UNITED STATES
U.S. Army Private First Class Bradley Manning departs the courtroom after day four of his court martial...
U.S. Army Private First Class Bradley Manning (L) departs the courtroom after day four of his court martial at Fort Meade, Maryland June 10, 2013. Computer forensic experts testified on Monday that they traced a break-in to a secret U.S. government website to Manning, the U.S. soldier charged with the biggest leak of classified files in the nation's history. REUTERS/Gary Cameron (UNITED STATES - Tags: MILITARY CRIME LAW POLITICS)
USA-WIKILEAKS/MANNING
RTX10J1Z
June 10, 2013
U.S. Army Private First Class Bradley Manning (C) departs the courtroom after day four of his court martial...
FT MEADE, UNITED STATES
U.S. Army Private First Class Bradley Manning departs the courtroom after day four of his court martial...
U.S. Army Private First Class Bradley Manning (C) departs the courtroom after day four of his court martial at Fort Meade, Maryland June 10, 2013. Computer forensic experts testified on Monday that they traced a break-in to a secret U.S. government website to Manning, the U.S. soldier charged with the biggest leak of classified files in the nation's history. REUTERS/Gary Cameron (UNITED STATES - Tags: MILITARY CRIME LAW POLITICS)
SINGAPORE-USA/ENGINEER
RTXZVYJ
May 22, 2013
John and Dylan (R) Todd, brothers of Shane Todd, arrive with private computer forensic expert hired by...
Singapore, Singapore
The brothers of Shane Todd arrive with private computer forensic expert hired by the family, Ashraf Massoud,...
John and Dylan (R) Todd, brothers of Shane Todd, arrive with private computer forensic expert hired by the family, Ashraf Massoud (L), at the Subordinate Courts in Singapore May 22, 2013. The parents of Shane Todd, a U.S. engineer found dead in Singapore last year, said on Wednesday they will not take part in the rest of a coroner's inquiry into his death, which they say was linked to a project involving the transfer of sensitive technology to China. In a statement issued through their lawyers, Rick and Mary Todd said they had lost confidence in the system investigating the death of their 31-year-old son, Shane, who was found hanging in his Singapore apartment last June. REUTERS/Edgar Su (SINGAPORE - Tags: CRIME LAW)
BALKANS-TECHNOLOGY/
RTXZ0YA
April 26, 2013
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in...
Bucharest, Romania
File photo of Romanian Cernaianu, formerly known as a hacker by the name of TinKode, working at his laptop...
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in his office in Bucharest in this March 15, 2013 file picture. After hacking the Pentagon, NASA and Britain's Royal Navy for fun, TinKode got a real job as a computer security expert for a Romanian cyber safety consultancy. TinKode was the name used by Cernaianu when he revealed security holes in government and corporate systems across the world, earning him a two-year suspended prison sentence. Picture taken March 15, 2013. REUTERS/Bogdan Cristel/Files (ROMANIA - Tags: SOCIETY SCIENCE TECHNOLOGY)
BALKANS-TECHNOLOGY/
RTXZ0Y9
April 26, 2013
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in...
Bucharest, Romania
File photo of Romanian Cernaianu, formerly known as a hacker by the name of TinKode, working at his laptop...
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in his office in Bucharest in this March 15, 2013 file picture. After hacking the Pentagon, NASA and Britain's Royal Navy for fun, TinKode got a real job as a computer security expert for a Romanian cyber safety consultancy. TinKode was the name used by Cernaianu when he revealed security holes in government and corporate systems across the world, earning him a two-year suspended prison sentence. Picture taken March 15, 2013. REUTERS/Bogdan Cristel/Files (ROMANIA - Tags: SOCIETY SCIENCE TECHNOLOGY)
BALKANS-TECHNOLOGY/
RTXZ0Y6
April 26, 2013
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in...
Bucharest, Romania
File photo of Romanian Cernaianu, formerly known as a hacker by the name of TinKode, working at his laptop...
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in his office in Bucharest in this March 15, 2013 file picture. After hacking the Pentagon, NASA and Britain's Royal Navy for fun, TinKode got a real job as a computer security expert for a Romanian cyber safety consultancy. TinKode was the name used by Cernaianu when he revealed security holes in government and corporate systems across the world, earning him a two-year suspended prison sentence. Picture taken March 15, 2013. REUTERS/Bogdan Cristel/Files (ROMANIA - Tags: SOCIETY SCIENCE TECHNOLOGY)
BALKANS-TECHNOLOGY/
RTXZ0Y5
April 26, 2013
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in...
Bucharest, Romania
File photo of Romanian Cernaianu, formerly known as a hacker by the name of TinKode, working at his laptop...
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in his office in Bucharest in this March 15, 2013 file picture. After hacking the Pentagon, NASA and Britain's Royal Navy for fun, TinKode got a real job as a computer security expert for a Romanian cyber safety consultancy. TinKode was the name used by Cernaianu when he revealed security holes in government and corporate systems across the world, earning him a two-year suspended prison sentence. Picture taken March 15, 2013. REUTERS/Bogdan Cristel/Files (ROMANIA - Tags: SOCIETY SCIENCE TECHNOLOGY)
BALKANS-TECHNOLOGY/
RTXZ0Y4
April 26, 2013
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in...
Bucharest, Romania
File photo of Romanian Cernaianu, formerly known as a hacker by the name of TinKode, working at his laptop...
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in his office in Bucharest in this March 15, 2013 file picture. After hacking the Pentagon, NASA and Britain's Royal Navy for fun, TinKode got a real job as a computer security expert for a Romanian cyber safety consultancy. TinKode was the name used by Cernaianu when he revealed security holes in government and corporate systems across the world, earning him a two-year suspended prison sentence. Picture taken March 15, 2013. REUTERS/Bogdan Cristel/Files (ROMANIA - Tags: SOCIETY SCIENCE TECHNOLOGY)
INTERNET-ATTACK/
RTXXZVZ
March 27, 2013
A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. One...
Warsaw, Poland
Illustration file picture shows a man typing on a computer keyboard in Warsaw
A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. One of the largest ever cyber attacks is slowing global internet services after an organisation blocking "spam" content became a target, with some experts saying the disruption could get worse. To match INTERNET-ATTACK/ REUTERS/Kacper Pempel/Files (POLAND - Tags: BUSINESS SCIENCE TECHNOLOGY)
INTERNET-ATTACK/
RTXXZVX
March 27, 2013
A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. One...
Warsaw, Poland
Illustration file picture shows a man typing on a computer keyboard in Warsaw
A man types on a computer keyboard in Warsaw in this February 28, 2013 illustration file picture. One of the largest ever cyber attacks is slowing global internet services after an organisation blocking "spam" content became a target, with some experts saying the disruption could get worse. To match INTERNET-ATTACK/ REUTERS/Kacper Pempel/Files (POLAND - Tags: BUSINESS SCIENCE TECHNOLOGY)
AMAZON/
RTR3B00V
November 29, 2012
Developers and programmers participate in a coding challenge at the AWS Re:Invent conference at the Sands...
Las Vegas, UNITED STATES
Developers and programmers participate in a coding challenge at the AWS Re:Invent conference in Las Vegas...
Developers and programmers participate in a coding challenge at the AWS Re:Invent conference at the Sands Expo in Las Vegas Nevada Nov. 28, 2012. REUTERS/Richard Brian(UNITED STATES - Tags: SCIENCE TECHNOLOGY BUSINESS)
POPE-BUTLER-COMPUTER
RTR3A0GV
November 05, 2012
A general view of St. Peter's square as Pope Benedict XVI conducts a special mass in Vatican City in...
Vatican City, Vatican City
File photo of a general view of St. Peter's square as Pope Benedict XVI conducts a special mass in Vatican...
A general view of St. Peter's square as Pope Benedict XVI conducts a special mass in Vatican City in this October 21, 2012 file photograph. A Vatican court on November 5, 2012, heard how Pope Benedict's former butler, who has been jailed for stealing papal documents, refused to allow technicians to check his computer for six years before his arrest.The detail emerged at the first hearing of the trial of Claudio Sciarpelletti, a computer expert who is charged with aiding and abetting former butler Paolo Gabriele. REUTERS/Stefano Rellandini /Files (VATICAN - Tags: RELIGION CRIME LAW)
Sort by
Display
Items per page
Page
of 4