Ajax loader

Can't find what you're looking for?

 

Be sure to Sign in to see all available content.

 

If you don't have an account, Register here.

Search results for: Computer-expert

TUNISIA-HEALTH/STARTUP
RTS5CBEY 
February 03, 2022 
InnoDeep start-up CEO Mustapha Hamdi sits with InnoDeep expert Mourad Jabou as they look at a screen... 
Tunis, Tunisia 
InnoDeep start-up CEO Hamdi sits with InnoDeep expert Jabou in their office in Tunis 
InnoDeep start-up CEO Mustapha Hamdi sits with InnoDeep expert Mourad Jabou as they look at a screen in their office in Tunis, Tunisia February 3, 2022. Picture taken February 3, 2022. REUTERS/Jihed Abidellaoui 
GLOBAL-COMPUTERS/
RTS1GS1A 
October 17, 2017 
A man checks the power lines on a motherboard of a laptop at a repair center in Colombo, Sri Lanka October... 
Colombo, Sri Lanka 
A man checks the power lines on a motherboard of a laptop at a repair center in Colombo 
A man checks the power lines on a motherboard of a laptop at a repair center in Colombo, Sri Lanka October 17, 2017. REUTERS/Dinuka Liyanawatte 
CYBER-ATTACK/
RTX35OS3 
May 13, 2017 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on... 
Warsaw, Poland 
Man holds laptop computer as cyber code is projected on him in this illustration picture 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration 
CYBER-ATTACK/
RTX35OS1 
May 13, 2017 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on... 
Warsaw, Poland 
Man holds laptop computer as cyber code is projected on him in this illustration picture 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration 
CYBER-ATTACK/
RTX35OS0 
May 13, 2017 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on... 
Warsaw, Poland 
Man holds laptop computer as cyber code is projected on him in this illustration picture 
A man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration 
CYBER-ATTACK/
RTX35ORW 
May 13, 2017 
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken... 
Warsaw, Poland 
Hooded man holds laptop computer as cyber code is projected on him in this illustration picture 
A hooded man holds a laptop computer as cyber code is projected on him in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration 
CYBER-ATTACK/
RTX35ORT 
May 13, 2017 
A projection of cyber code on a hooded man is pictured in this illustration picture taken on May 13,... 
Warsaw, Poland 
Projection of cyber code on hooded man is pictured in this illustration picture 
A projection of cyber code on a hooded man is pictured in this illustration picture taken on May 13, 2017. Capitalizing on spying tools believed to have been developed by the U.S. National Security Agency, hackers staged a cyber assault with a self-spreading malware that has infected tens of thousands of computers in nearly 100 countries. REUTERS/Kacper Pempel/Illustration TPX IMAGES OF THE DAY 
APPLE-DEVELOPERS/
RTX2G1OT 
June 13, 2016 
A group of young developers stand for a group photo on stage during the Apple World Wide Developers Conference... 
San Francisco, UNITED STATES 
A group of young developers stand for a group photo on stage during the Apple World Wide Developers Conference... 
A group of young developers stand for a group photo on stage during the Apple World Wide Developers Conference in San Francisco, California, U.S., June 13, 2016. REUTERS/Stephen Lam TPX IMAGES OF THE DAY
PANAMA-TAX/AUSTRALIA-SOFTWARE
RTSDN0S 
April 05, 2016 
An employee of software company Nuix stands in their office located in central Sydney, Australia, April... 
Sydney, Australia 
An employee of software company Nuix stands in their office located in central Sydney, Australia 
An employee of software company Nuix stands in their office located in central Sydney, Australia, April 5, 2016. Software produced by the little-known Australian developer has helped journalists piece together news leads from the mountains of data found in the contents of the Panama Papers, one of the biggest document leaks in history. Sydney-based Nuix Pty Ltd donated its document analysis programme to the International Consortium of Investigative Journalists (ICIJ) to sift through the millions of leaked documents from Panamanian law firm Mossack Fonseca. REUTERS/David Gray 
PANAMA-TAX/AUSTRALIA-SOFTWARE
RTSDN0R 
April 05, 2016 
Employees of software company Nuix sit in their office located in central Sydney, Australia, April 5,... 
Sydney, Australia 
Employees of software company Nuix sit in their office located in central Sydney, Australia 
Employees of software company Nuix sit in their office located in central Sydney, Australia, April 5, 2016. Software produced by the little-known Australian developer has helped journalists piece together news leads from the mountains of data found in the contents of the Panama Papers, one of the biggest document leaks in history. Sydney-based Nuix Pty Ltd donated its document analysis programme to the International Consortium of Investigative Journalists (ICIJ) to sift through the millions of leaked documents from Panamanian law firm Mossack Fonseca. REUTERS/David Gray 
ONEVIEW-AUSTRALIA/IPO
RTSAT4P 
March 17, 2016 
Irish health software maker Oneview's Chief Executive Officer James Fitter (L) and founder and executive... 
Sydney, Australia 
Irish health software maker Oneview's Chief Executive Officer Fitter and founder and executive director... 
Irish health software maker Oneview's Chief Executive Officer James Fitter (L) and founder and executive director Mark McCloskey react after they broke the rope ringing the bell at the Australian Securities Exchange during the official listing ceremony in Sydney, Australia, March 17, 2016. REUTERS/David Gray 
ONEVIEW-AUSTRALIA/IPO
RTSAT4O 
March 17, 2016 
Irish health software maker Oneview's Chief Executive Officer James Fitter (L) and founder and executive... 
Sydney, Australia 
Irish health software maker Oneview's Chief Executive Officer Fitter and founder and executive director... 
Irish health software maker Oneview's Chief Executive Officer James Fitter (L) and founder and executive director Mark McCloskey react after they broke the rope ringing the bell at the Australian Securities Exchange during the official listing ceremony in Sydney, Australia, March 17, 2016. REUTERS/David Gray 
NIGERIA-TECHNOLOGY/YABA
RTX1M6M3 
July 28, 2015 
Software developers work at the Information Technology Developers Entrepreneurship Accelerator (iDEA)... 
Lagos, Nigeria 
Software developers work at the iDEA hub in the Yaba district in Lagos 
Software developers work at the Information Technology Developers Entrepreneurship Accelerator (iDEA) hub in the Yaba district in Lagos June 25, 2015. At first glance, Yaba is like many other parts of Nigeria's sprawling commercial capital: a cacophony of car horns and shouting street vendors, mingling with exhaust fumes and the occasional stench of sewage. But in between the run-down buildings in this seemingly inauspicious part of Lagos, a city of around 21 million, tech start-ups are taking root and creating a buzz that is drawing international venture capitalists and more established digital firms. Picture taken June 25, 2015. REUTERS/Akintunde Akinleye 
NIGERIA-TECHNOLOGY/YABA
RTX1M6M2 
July 28, 2015 
Software developers work on computer sytems at the Information Technology Developers Entrepreneurship... 
Lagos, Nigeria 
Software developers work on computer sytems at the iDEA hub in the Yaba district in Lagos 
Software developers work on computer sytems at the Information Technology Developers Entrepreneurship Accelerator (iDEA) hub in the Yaba district in Lagos June 25, 2015. At first glance, Yaba is like many other parts of Nigeria's sprawling commercial capital: a cacophony of car horns and shouting street vendors, mingling with exhaust fumes and the occasional stench of sewage. But in between the run-down buildings in this seemingly inauspicious part of Lagos, a city of around 21 million, tech start-ups are taking root and creating a buzz that is drawing international venture capitalists and more established digital firms. Picture taken June 25, 2015. REUTERS/Akintunde Akinleye
ISRAEL-ARCHAEOLOGY/
RTX1L38T 
July 20, 2015 
Writings, believed to be ancient Hebrew script from the bible, is displayed on a computer screen at the... 
Jerusalem, Israel 
Writing, believed to be ancient Hebrew script from the bible is displayed in Jerusalem 
Writings, believed to be ancient Hebrew script from the bible, is displayed on a computer screen at the Israel Museum in Jerusalem July 20, 2015. Israeli archaeologists said on Monday they had discerned the biblical writing on a 1,500 year old scroll they deemed the oldest biblical text found since the Dead Sea Scrolls. Using micro C-T scanning and virtual mapping techniques scientists last week discerned an ancient Hebrew script of what experts say are the first eight verses of the bible's old testament book of Leviticus, a curator at the Israel Antiquities Authority said. REUTERS/Amir Cohen 
MIDEAST-PALESTINIANS/TECHNOLOGY
RTR4MAFD 
January 21, 2015 
Palestinian employees process data on their laptops at Unit One in Gaza City January 15, 2015. In nine... 
Gaza City, Palestinian Territories 
Palestinian employees process data on their laptops at Unit One in Gaza City 
Palestinian employees process data on their laptops at Unit One in Gaza City January 15, 2015. In nine years, Gaza-based IT entrepreneur Saady Lozon and his partner Ahmed Abu Shaban have transformed their firm, Unit One, from a tiny outfit in a single room in the blockaded Gaza Strip into a successful business with clients in Europe, the United States and the Arab world. They can't leave Gaza easily, but they can develop applications for Web and mobile devices online and provide international clients with data-management services, competing with firms in India and elsewhere. Picture taken January 15, 2015. To match story MIDEAST-PALESTINIANS/TECHNOLOGY REUTERS/Mohammed Salem (GAZA - Tags: SCIENCE TECHNOLOGY BUSINESS) 
RETAIL-CUSTOMISATION/
RTR4HXDS 
December 14, 2014 
A tablet to customise sneakers is pictured in an Adidas pop-up store in Berlin December 2, 2014. Big... 
Berlin, Germany 
A tablet to customise sneakers is pictured in an Adidas pop-up store in Berlin 
A tablet to customise sneakers is pictured in an Adidas pop-up store in Berlin December 2, 2014. Big consumer brands have latched on to personalised products because they seem to have a particular appeal to consumers known as "Millennials" in marketing speak. Used to posting selfie mobile phone shots on social media, this generation, who came of age from around 2000, wants something more than just the latest hot brand name. Millennials still like brands but expect them to listen and react to their ideas and criticism in real time and allow them a role in shaping future products. They have become a big focus of marketing experts as their spending power grows. Picture taken December 2, 2014. REUTERS/Hannibal Hanschke (GERMANY - Tags: BUSINESS SOCIETY) 
BRITAIN-POLITICS/
RTR4H3YS 
December 08, 2014 
Britain's Prime Minister David Cameron sits on the floor as he joins students for "An Hour of Coding"... 
London, United Kingdom 
Britain's Prime Minister David Cameron sits on the floor as he joins students for "An Hour of Coding"... 
Britain's Prime Minister David Cameron sits on the floor as he joins students for "An Hour of Coding" at Number 10 Downing Street in London December 8, 2014. REUTERS/Stefan Rousseau/pool (BRITAIN - Tags: POLITICS SCIENCE TECHNOLOGY EDUCATION TPX IMAGES OF THE DAY) 
HEALTH-MERS-SAUDI
RTR4CFJQ 
November 01, 2014 
A man takes a "selfie" with camels at a farm in Taif November 1, 2014. Saudi Arabia said late on Wednesday... 
Taif, Saudi Arabia 
A man takes a "selfie" with camels at a farm in Taif 
A man takes a "selfie" with camels at a farm in Taif November 1, 2014. Saudi Arabia said late on Wednesday it had detected six new cases of the deadly Middle East Respiratory Syndrome (MERS) in 24 hours, the biggest daily jump for months with officials blaming lax hospital procedures. Scientists are not sure of the origin of the virus, but several studies have linked it to camels and some experts think it is being passed to humans through close physical contact or through the consumption of camel meat or camel milk. REUTERS/Mohamed Alhwaity (SAUDI ARABIA - Tags: ANIMALS SOCIETY HEALTH TPX IMAGES OF THE DAY) 
GRAINS-ARGENTINA-RAINS/
RTR45QMY 
September 10, 2014 
A resident takes pictures of cattle grazing at a flooded wheat field near the area of Bolivar, southwest... 
Buenos Aires, Argentina 
A resident takes pictures of cattle grazing at a flooded wheat field near the area of Bolivar, southwest... 
A resident takes pictures of cattle grazing at a flooded wheat field near the area of Bolivar, southwest of Buenos Aires September 10, 2014. The Argentine wheat crop cycle 2014/15 could suffer serious losses due to heavy rains that left under water more than a million hectares in the agricultural center of the country, about 30 percent of the area for cereal, experts said. REUTERS/Enrique Marcarian (ARGENTINA - Tags: AGRICULTURE ANIMALS ENVIRONMENT) 
COLOMBIA-REBELS/VIDEOGAMES
RTR45E18 
September 08, 2014 
Colombian systems programmer Juan Pico works on the video game "Adios a las Armas" (Farewell to Arms)... 
Bogota, Colombia 
Colombian systems programmer Juan Pico works on the video game "Adios a las Armas" (Farewell to Arms)... 
Colombian systems programmer Juan Pico works on the video game "Adios a las Armas" (Farewell to Arms) in Bogota September 4, 2014. Colombians will soon be able to sit around a virtual negotiating table as Marxist FARC rebels or the government to thrash out an end to 50 years of war in a video game mirroring complex real life talks now under way to restore peace to the country. "Adios a las Armas," or "Farewell to Arms," a finalist in a government competition in July for non-violent video games, aims to raise awareness about a peace deal being negotiated in Cuba which voters will back or reject in a referendum. Picture taken September 4, 2014. REUTERS/Jose Miguel Gomez (COLOMBIA - Tags: CONFLICT SOCIETY) 
COLOMBIA-REBELS/VIDEOGAMES
RTR45E13 
September 08, 2014 
Colombian systems programmer Camilo Paez works on the video game "Adios a las Armas" (Farewell to Arms)... 
Bogota, Colombia 
Colombian systems programmer Camilo Paez works on the video game "Adios a las Armas" (Farewell to Arms)... 
Colombian systems programmer Camilo Paez works on the video game "Adios a las Armas" (Farewell to Arms) in Bogota September 4, 2014. Colombians will soon be able to sit around a virtual negotiating table as Marxist FARC rebels or the government to thrash out an end to 50 years of war in a video game mirroring complex real life talks now under way to restore peace to the country."Adios a las Armas," or "Farewell to Arms," a finalist in a government competition in July for non-violent video games, aims to raise awareness about a peace deal being negotiated in Cuba which voters will back or reject in a referendum. Picture taken September 4, 2014. REUTERS/Jose Miguel Gomez (COLOMBIA - Tags: CONFLICT SOCIETY) 
CYBERSECURITY-HACKING/
RTR41HX3 
August 06, 2014 
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker... 
Las Vegas, UNITED STATES 
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker... 
Utkarsh Sanghi, a security engineer at Google, works in a hallway during the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS) 
CYBERSECURITY-HACKING/
RTR41HX1 
August 06, 2014 
An image of Chinese military officer Sun Kailiang is displayed as computer security expert Mikko Hypponen... 
Las Vegas, UNITED STATES 
An image of Chinese military officer Sun Kailiang is displayed as computer security expert Hypponen of... 
An image of Chinese military officer Sun Kailiang is displayed as computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during a briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. Sun Kailiang is one of five Chinese military officers accused of hacking into American companies. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY CRIME LAW POLITICS BUSINESS) 
CYBERSECURITY-HACKING/
RTR41HWI 
August 06, 2014 
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next... 
Las Vegas, UNITED STATES 
Computer security expert Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation"... 
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS) 
CYBERSECURITY-HACKING/
RTR41HWH 
August 06, 2014 
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next... 
Las Vegas, UNITED STATES 
Computer security expert Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation"... 
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS) 
CYBERSECURITY-HACKING/
RTR41HWG 
August 06, 2014 
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next... 
Las Vegas, UNITED STATES 
Computer security expert Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation"... 
Computer security expert Mikko Hypponen of Finland speaks on "Governments As Malware Authors: The Next Generation" during briefing at the Black Hat USA 2014 hacker conference at the Mandalay Bay Convention Center in Las Vegas, Nevada August 6, 2014. REUTERS/Steve Marcus (UNITED STATES - Tags: SCIENCE TECHNOLOGY POLITICS BUSINESS) 
FRANCE/
RTX15V1R 
November 27, 2013 
A combination picture shows Millenium eSport professional gamers looking at their computer screens inside... 
Marseille, France 
A combination picture shows Millenium eSport professional gamers looking at their computer screens inside... 
A combination picture shows Millenium eSport professional gamers looking at their computer screens inside the Millenium Gaming House in Marseille November 12, 2013. The Millenium Gaming House, which opened its doors in Marseille in 2011, is the most important French e-sport organization and houses pro gamers who live, game, eat and sleep full-time in the building. The house is dedicated to the training of Pro Gamers teams for International competitions. Players train long hours to master the difficulties and subtleties of only one game and participate in Lan-Parties around the world. E-Sports earnings has ranked the 100 players with the highest overall earnings from competitive gaming, with over 60 gamers who have earned over $100,000 in prize money. Picture taken November 12, 2013. REUTERS/Jean-Paul Pelissier (FRANCE - Tags: BUSINESS ENTERTAINMENT SCIENCE TECHNOLOGY SOCIETY TPX IMAGES OF THE DAY) 
FRANCE/
RTX15V1C 
November 27, 2013 
Millenium eSport professional gamer Arif of France, nicknamed Doigby, looks at a computer screen as he... 
Marseille, France 
Millenium eSport professional gamer Arif of France, nicknamed Doigby, looks at a computer screen as he... 
Millenium eSport professional gamer Arif of France, nicknamed Doigby, looks at a computer screen as he plays inside the Millenium Gaming House in Marseille Novembre 15, 2013. The Millenium Gaming House, which opened its doors in Marseille in 2011, is the most important French e-sport organization and houses pro gamers who live, game, eat and sleep full-time in the building. The house is dedicated to the training of Pro Gamers teams for International competitions. Players train long hours to master the difficulties and subtleties of only one game and participate in Lan-Parties around the world. E-Sports earnings has ranked the 100 players with the highest overall earnings from competitive gaming, with over 60 gamers who have earned over $100,000 in prize money. Picture taken November 15, 2013. REUTERS/Jean-Paul Pelissier (FRANCE - Tags: BUSINESS ENTERTAINMENT SCIENCE TECHNOLOGY SOCIETY) 
MICROSOFT-CYBERCRIME/
RTX15DDA 
November 14, 2013 
A sign is pictured in the hallway of the Microsoft Cybercrime Center, the new headquarters of the Microsoft... 
Redmond, UNITED STATES 
A sign is pictured in the hallway of the Microsoft Cybercrime Center, the new headquarters of the Microsoft... 
A sign is pictured in the hallway of the Microsoft Cybercrime Center, the new headquarters of the Microsoft Digital Crimes Unit, in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW) 
MICROSOFT-CYBERCRIME/
RTX15DD7 
November 14, 2013 
A malware lab is pictured inside the Microsoft Cybercrime Center, the new headquarters of the Microsoft... 
Redmond, UNITED STATES 
A malware lab is pictured inside the Microsoft Cybercrime Center, the new headquarters of the Microsoft... 
A malware lab is pictured inside the Microsoft Cybercrime Center, the new headquarters of the Microsoft Digital Crimes Unit, in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW) 
MICROSOFT-CYBERCRIME/
RTX15DD6 
November 14, 2013 
Richard Boscovich, assistant general council for the Microsoft Digital Crimes Unit, talks about their... 
Redmond, UNITED STATES 
Richard Boscovich, assistant general council for the Microsoft Digital Crimes Unit, talks about their... 
Richard Boscovich, assistant general council for the Microsoft Digital Crimes Unit, talks about their work at the Microsoft Cybercrime Center, the unit's new headquarters in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW) 
MICROSOFT-CYBERCRIME/
RTX15DD3 
November 14, 2013 
The forensics lab's evidence room is pictured inside the Microsoft Cybercrime Center, the new headquarters... 
Redmond, UNITED STATES 
The forensics lab's evidence room is pictured inside the Microsoft Cybercrime Center, the new headquarters... 
The forensics lab's evidence room is pictured inside the Microsoft Cybercrime Center, the new headquarters of the Microsoft Digital Crimes Unit, in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW) 
MICROSOFT-CYBERCRIME/
RTX15DD0 
November 14, 2013 
Bruce Hembree, security operations employee at the Microsoft Digital Crimes Unit, talks about the Malware... 
Redmond, UNITED STATES 
Bruce Hembree, security operations employee at the Microsoft Digital Crimes Unit, talks about the Malware... 
Bruce Hembree, security operations employee at the Microsoft Digital Crimes Unit, talks about the Malware Lab during a tour at the Microsoft Cybercrime Center in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW) 
MICROSOFT-CYBERCRIME/
RTX15DCX 
November 14, 2013 
Vishant Patel, senior manager of investigations at the Microsoft Digital Crimes Unit, works in the unit's... 
Redmond, UNITED STATES 
Vishant Patel, senior manager of investigations at the Microsoft Digital Crimes Unit, works in the unit's... 
Vishant Patel, senior manager of investigations at the Microsoft Digital Crimes Unit, works in the unit's Malware Lab at the Microsoft Cybercrime Center in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW) 
MICROSOFT-CYBERCRIME/
RTX15DCU 
November 14, 2013 
Vishant Patel (2nd L), senior manager of investigations at the Microsoft Digital Crimes Unit, works in... 
Redmond, UNITED STATES 
Vishant Patel, senior manager of investigations at the Microsoft Digital Crimes Unit, works in the unit's... 
Vishant Patel (2nd L), senior manager of investigations at the Microsoft Digital Crimes Unit, works in the unit's Malware Lab as Associate General Counsel David Finn (R), Security Operations employee Bruce Hembree (L) are reflected in a glass window while giving a tour at the Microsoft Cybercrime Center in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW) 
MICROSOFT-CYBERCRIME/
RTX15DCQ 
November 14, 2013 
David Finn, associate general counsel for the Microsoft Digital Crimes Unit, gives a tour of the unit's... 
Redmond, UNITED STATES 
David Finn, associate general counsel for the Microsoft Digital Crimes Unit, gives a tour of the unit's... 
David Finn, associate general counsel for the Microsoft Digital Crimes Unit, gives a tour of the unit's new headquarters at the Microsoft Cybercrime Center in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW) 
MICROSOFT-CYBERCRIME/
RTX15DCP 
November 14, 2013 
Vishant Patel, senior manager of investigations at the Microsoft Digital Crimes Unit, shows a heat map... 
Redmond, UNITED STATES 
Vishant Patel, senior manager of investigations at the Microsoft Digital Crimes Unit, shows a heat map... 
Vishant Patel, senior manager of investigations at the Microsoft Digital Crimes Unit, shows a heat map and talks about how malicious computer networks known as the Citadel Botnets attack computers in Western Europe at the Microsoft Cybercrime Center in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW) 
MICROSOFT-CYBERCRIME/
RTX15DCK 
November 14, 2013 
Peter Anaman, Microsoft Digital Crimes Unit's director of online piracy, gives an interview at the unit's... 
Redmond, UNITED STATES 
Peter Anaman, Microsoft Digital Crimes Unit's director of online piracy, gives an interview at the unit's... 
Peter Anaman, Microsoft Digital Crimes Unit's director of online piracy, gives an interview at the unit's new headquarters in the Microsoft Cybercrime Center in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW) 
MICROSOFT-CYBERCRIME/
RTX15DCD 
November 14, 2013 
Richard Boscovich, assistant general council for the Microsoft Digital Crimes Unit, gives an interview... 
Redmond, UNITED STATES 
Richard Boscovich, assistant general council for the Microsoft Digital Crimes Unit, gives an interview... 
Richard Boscovich, assistant general council for the Microsoft Digital Crimes Unit, gives an interview at the Microsoft Cybercrime Center, the unit's new headquarters in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW) 
MICROSOFT-CYBERCRIME/
RTX15D54 
November 14, 2013 
The forensics lab at Microsoft's Cybercrime Center, the new headquarters of the Microsoft Digital Crimes... 
Redmond, UNITED STATES 
The forensics lab at Microsoft's Cybercrime Center, the new headquarters of the Microsoft Digital Crimes... 
The forensics lab at Microsoft's Cybercrime Center, the new headquarters of the Microsoft Digital Crimes Unit, in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW) 
MICROSOFT-CYBERCRIME/
RTX15D51 
November 14, 2013 
Microsoft Digital Crimes Unit chief David Finn gives a tour of the unit's new headquarters at the Microsoft... 
Redmond, UNITED STATES 
Microsoft Digital Crimes Unit chief David Finn gives a tour of the unit's new headquarters at the Microsoft... 
Microsoft Digital Crimes Unit chief David Finn gives a tour of the unit's new headquarters at the Microsoft Cybercrime Center in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW) 
MICROSOFT-CYBERCRIME/
RTX15D4T 
November 14, 2013 
A sign is pictured in the hallway of the Microsoft Cybercrime Center, the new headquarters of the Microsoft... 
Redmond, UNITED STATES 
A sign is pictured in the hallway of the Microsoft Cybercrime Center in Redmond, Washington 
A sign is pictured in the hallway of the Microsoft Cybercrime Center, the new headquarters of the Microsoft Digital Crimes Unit, in Redmond, Washington November 11, 2013. Microsoft, the maker of the most popular computer operating system in the world is launching a new strategy against criminal hackers by bringing together security engineers, digital forensics experts and lawyers trained in fighting software pirates under one roof at its new Cybercrime Center. Picture taken November 11, 2013. To match Feature MICROSOFT-CYBERCRIME/ REUTERS/Jason Redmond (UNITED STATES - Tags: BUSINESS SCIENCE TECHNOLOGY CRIME LAW) 
USA-HEALTHCARE/TECHNOLOGY
RTR3FIWS 
October 02, 2013 
Certified Application Counselor Gina Denis (C) takes information from Rose Valbrun (L) and William Merisier,... 
Miami, UNITED STATES 
A Certified Application Counselor takes information about Affordable Care Act insurance in Miami 
Certified Application Counselor Gina Denis (C) takes information from Rose Valbrun (L) and William Merisier, both of Miami, about Affordable Care Act insurance, known as Obamacare, at the Borinquen Medical Center in Miami, Florida October 2, 2013. Counselors were still not able to enroll interested people using the online system. Technology experts and government officials were stumped about the reasons for the computer glitches plaguing the Obama administration's launch of new health insurance exchanges. They variously blamed an unexpected deluge of customers and outright errors that information technology (IT) teams labored throughout the day to fix. REUTERS/Joe Skipper (UNITED STATES - Tags: HEALTH POLITICS) 
USA-HEALTHCARE/TECHNOLOGY
RTR3FIW6 
October 02, 2013 
Certified Application Counselor Gina Denis (L) takes information from Rose Valbrun (R) and William Merisier,... 
Miami, UNITED STATES 
A Certified Application Counselor takes information about Affordable Care Act insurance in Miami 
Certified Application Counselor Gina Denis (L) takes information from Rose Valbrun (R) and William Merisier, both of Miami, about Affordable Care Act insurance, known as Obamacare, at the Borinquen Medical Center in Miami, Florida October 2, 2013. Counselors were still not able to enroll interested people using the online system. Technology experts and government officials were stumped about the reasons for the computer glitches plaguing the Obama administration's launch of new health insurance exchanges. They variously blamed an unexpected deluge of customers and outright errors that information technology (IT) teams labored throughout the day to fix. REUTERS/Joe Skipper (UNITED STATES - Tags: HEALTH POLITICS BUSINESS) 
USA-HEALTHCARE/TECHNOLOGY
RTR3FIVN 
October 02, 2013 
A busy screen is shown on the laptop of a Certified Application Counselor as he attempted to enroll an... 
Miami, UNITED STATES 
A busy screen is shown on the laptop of a Certified Application Counselor as he attempted to enroll an... 
A busy screen is shown on the laptop of a Certified Application Counselor as he attempted to enroll an interested person for Affordable Care Act insurance, known as Obamacare, at the Borinquen Medical Center in Miami, Florida October 2, 2013. Counselors were still not able to enroll interested people using the online system. Technology experts and government officials were stumped about the reasons for the computer glitches plaguing the Obama administration's launch of new health insurance exchanges. They variously blamed an unexpected deluge of customers and outright errors that information technology (IT) teams labored throughout the day to fix. REUTERS/Joe Skipper (UNITED STATES - Tags: HEALTH POLITICS) 
USA-HEALTHCARE/TECHNOLOGY
RTR3FIVJ 
October 02, 2013 
Ricardo Mola (R) of Miami speaks with Certified Application Counselor Jason Connor after unsuccessfully... 
Miami, UNITED STATES 
Mola of Miami speaks with Connor after unsuccessfully trying to enroll for Affordable Care Act insurance,... 
Ricardo Mola (R) of Miami speaks with Certified Application Counselor Jason Connor after unsuccessfully trying to enroll for Affordable Care Act insurance, known as Obamacare, at the Borinquen Medical Center in Miami, Florida October 2, 2013. Technology experts and government officials were stumped about the reasons for the computer glitches plaguing the Obama administration's launch of new health insurance exchanges. They variously blamed an unexpected deluge of customers and outright errors that information technology (IT) teams labored throughout the day to fix. REUTERS/Joe Skipper (UNITED STATES - Tags: HEALTH POLITICS) 
USA-HEALTHCARE/TECHNOLOGY
RTR3FIV9 
October 02, 2013 
Visitors wait to speak with Certified Application Counselors about Affordable Care Act insurance, known... 
Miami, UNITED STATES 
Visitors wait to speak with Certified Application Counselors about Affordable Care Act insurance, known... 
Visitors wait to speak with Certified Application Counselors about Affordable Care Act insurance, known as Obamacare, at the Borinquen Medical Center in Miami, Florida October 2, 2013. Counselors were still not able to enroll interested people using the online system. Technology experts and government officials were stumped about the reasons for the computer glitches plaguing the Obama administration's launch of new health insurance exchanges . They variously blamed an unexpected deluge of customers and outright errors that information technology (IT) teams labored throughout the day to fix. REUTERS/Joe Skipper (UNITED STATES - Tags: HEALTH POLITICS) 
US-USA-HEALTHCARE
RTR3FIV5 
October 02, 2013 
Visitors speak with Certified Application Counselors about Affordable Care Act insurance, known as Obamacare,... 
Miami, UNITED STATES 
Visitors speak with Certified Application Counselors about Affordable Care Act insurance, known as Obamacare,... 
Visitors speak with Certified Application Counselors about Affordable Care Act insurance, known as Obamacare, at the Borinquen Medical Center in Miami, Florida October 2, 2013. Counselors were still not able to enroll interested people using the online system. Technology experts and government officials were stumped about the reasons for the computer glitches plaguing the Obama administration's launch of new health insurance exchanges . They variously blamed an unexpected deluge of customers and outright errors that information technology (IT) teams labored throughout the day to fix. REUTERS/Joe Skipper (UNITED STATES - Tags: HEALTH POLITICS) 
USA-HEALTHCARE/TECHNOLOGY
RTR3FIV0 
October 02, 2013 
Ricardo Mola of Miami speaks with Certified Application Counselor Jason Connor after unsuccessfully trying... 
Miami, UNITED STATES 
Mola speaks with Certified Application Counselor Connor after unsuccessfully trying to enroll for Affordable... 
Ricardo Mola of Miami speaks with Certified Application Counselor Jason Connor after unsuccessfully trying to enroll for Affordable Care Act insurance, known as Obamacare, at the Borinquen Medical Center in Miami, Florida October 2, 2013. Counselors were still not able to enroll interested people using the online system. Technology experts and government officials were stumped about the reasons for the computer glitches plaguing the Obama administration's launch of new health insurance exchanges . They variously blamed an unexpected deluge of customers and outright errors that information technology (IT) teams labored throughout the day to fix. REUTERS/Joe Skipper (UNITED STATES - Tags: HEALTH POLITICS) 
Technology
Technology 
NSA Chief Speaks at Hacker Convention - 01 Aug 2013 
8 PICTURES 
AUSTRALIA-GEEKS/MINERS
RTX10YI8 
June 23, 2013 
Naked "Ninja Boxes" are tested at the Ninja Blocks office in Sydney May 31, 2013. A group of industry... 
Sydney, Australia 
Naked "Ninja Boxes" are tested at the Ninja Blocks office in Sydney 
Naked "Ninja Boxes" are tested at the Ninja Blocks office in Sydney May 31, 2013. A group of industry leaders, including the Atlassian duo, recently formed Blackbird Ventures to invest A$20 million in Australian start-ups that have the potential to be global success stories. Blackbird has so far invested in online design platform Canva and Ninja Blocks, a software developer bringing the remote controlled home to the masses by connecting home devices to web and mobile apps. Picture taken May 31, 2013. To match story AUSTRALIA-GEEKS/MINERS REUTERS/Daniel Munoz (AUSTRALIA - Tags: BUSINESS SCIENCE TECHNOLOGY COMMODITIES) 
USA-WIKILEAKS/MANNING
RTX10J22 
June 10, 2013 
U.S. Army Private First Class Bradley Manning (L) departs the courtroom after day four of his court martial... 
FT MEADE, UNITED STATES 
U.S. Army Private First Class Bradley Manning departs the courtroom after day four of his court martial... 
U.S. Army Private First Class Bradley Manning (L) departs the courtroom after day four of his court martial at Fort Meade, Maryland June 10, 2013. Computer forensic experts testified on Monday that they traced a break-in to a secret U.S. government website to Manning, the U.S. soldier charged with the biggest leak of classified files in the nation's history. REUTERS/Gary Cameron (UNITED STATES - Tags: MILITARY CRIME LAW POLITICS) 
USA-WIKILEAKS/MANNING
RTX10J21 
June 10, 2013 
U.S. Army Private First Class Bradley Manning (L) departs the courtroom after day four of his court martial... 
FT MEADE, UNITED STATES 
U.S. Army Private First Class Bradley Manning departs the courtroom after day four of his court martial... 
U.S. Army Private First Class Bradley Manning (L) departs the courtroom after day four of his court martial at Fort Meade, Maryland June 10, 2013. Computer forensic experts testified on Monday that they traced a break-in to a secret U.S. government website to Manning, the U.S. soldier charged with the biggest leak of classified files in the nation's history. REUTERS/Gary Cameron (UNITED STATES - Tags: MILITARY CRIME LAW POLITICS) 
USA-WIKILEAKS/MANNING
RTX10J1Z 
June 10, 2013 
U.S. Army Private First Class Bradley Manning (C) departs the courtroom after day four of his court martial... 
FT MEADE, UNITED STATES 
U.S. Army Private First Class Bradley Manning departs the courtroom after day four of his court martial... 
U.S. Army Private First Class Bradley Manning (C) departs the courtroom after day four of his court martial at Fort Meade, Maryland June 10, 2013. Computer forensic experts testified on Monday that they traced a break-in to a secret U.S. government website to Manning, the U.S. soldier charged with the biggest leak of classified files in the nation's history. REUTERS/Gary Cameron (UNITED STATES - Tags: MILITARY CRIME LAW POLITICS) 
SINGAPORE-USA/ENGINEER
RTXZVYJ 
May 22, 2013 
John and Dylan (R) Todd, brothers of Shane Todd, arrive with private computer forensic expert hired by... 
Singapore, Singapore 
The brothers of Shane Todd arrive with private computer forensic expert hired by the family, Ashraf Massoud,... 
John and Dylan (R) Todd, brothers of Shane Todd, arrive with private computer forensic expert hired by the family, Ashraf Massoud (L), at the Subordinate Courts in Singapore May 22, 2013. The parents of Shane Todd, a U.S. engineer found dead in Singapore last year, said on Wednesday they will not take part in the rest of a coroner's inquiry into his death, which they say was linked to a project involving the transfer of sensitive technology to China. In a statement issued through their lawyers, Rick and Mary Todd said they had lost confidence in the system investigating the death of their 31-year-old son, Shane, who was found hanging in his Singapore apartment last June. REUTERS/Edgar Su (SINGAPORE - Tags: CRIME LAW) 
BALKANS-TECHNOLOGY/
RTXZ0YA 
April 26, 2013 
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in... 
Bucharest, Romania 
File photo of Romanian Cernaianu, formerly known as a hacker by the name of TinKode, working at his laptop... 
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in his office in Bucharest in this March 15, 2013 file picture. After hacking the Pentagon, NASA and Britain's Royal Navy for fun, TinKode got a real job as a computer security expert for a Romanian cyber safety consultancy. TinKode was the name used by Cernaianu when he revealed security holes in government and corporate systems across the world, earning him a two-year suspended prison sentence. Picture taken March 15, 2013. REUTERS/Bogdan Cristel/Files (ROMANIA - Tags: SOCIETY SCIENCE TECHNOLOGY) 
BALKANS-TECHNOLOGY/
RTXZ0Y9 
April 26, 2013 
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in... 
Bucharest, Romania 
File photo of Romanian Cernaianu, formerly known as a hacker by the name of TinKode, working at his laptop... 
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in his office in Bucharest in this March 15, 2013 file picture. After hacking the Pentagon, NASA and Britain's Royal Navy for fun, TinKode got a real job as a computer security expert for a Romanian cyber safety consultancy. TinKode was the name used by Cernaianu when he revealed security holes in government and corporate systems across the world, earning him a two-year suspended prison sentence. Picture taken March 15, 2013. REUTERS/Bogdan Cristel/Files (ROMANIA - Tags: SOCIETY SCIENCE TECHNOLOGY) 
BALKANS-TECHNOLOGY/
RTXZ0Y6 
April 26, 2013 
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in... 
Bucharest, Romania 
File photo of Romanian Cernaianu, formerly known as a hacker by the name of TinKode, working at his laptop... 
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in his office in Bucharest in this March 15, 2013 file picture. After hacking the Pentagon, NASA and Britain's Royal Navy for fun, TinKode got a real job as a computer security expert for a Romanian cyber safety consultancy. TinKode was the name used by Cernaianu when he revealed security holes in government and corporate systems across the world, earning him a two-year suspended prison sentence. Picture taken March 15, 2013. REUTERS/Bogdan Cristel/Files (ROMANIA - Tags: SOCIETY SCIENCE TECHNOLOGY) 
BALKANS-TECHNOLOGY/
RTXZ0Y5 
April 26, 2013 
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in... 
Bucharest, Romania 
File photo of Romanian Cernaianu, formerly known as a hacker by the name of TinKode, working at his laptop... 
Romanian Razvan Cernaianu, formerly known as a hacker by the name of TinKode, works at his laptop in his office in Bucharest in this March 15, 2013 file picture. After hacking the Pentagon, NASA and Britain's Royal Navy for fun, TinKode got a real job as a computer security expert for a Romanian cyber safety consultancy. TinKode was the name used by Cernaianu when he revealed security holes in government and corporate systems across the world, earning him a two-year suspended prison sentence. Picture taken March 15, 2013. REUTERS/Bogdan Cristel/Files (ROMANIA - Tags: SOCIETY SCIENCE TECHNOLOGY) 
Sort by 
Display 
Items per page 
Page 
of 5