Security » News »
Domain registrar Name.com forced its customers to reset their account passwords on Wednesday following a security breach on the company's servers that might have resulted in customer information being compromised.
Microsoft has released a temporary fix for a zero-day vulnerability in Internet Explorer 8, which was used by hackers in a prominent attack against the U.S. Department of Labor's website.
Intruders used to creep in through ventilation ducts. Now they break in using the software that controls the ventilation.
The iOSphere seems to have lowered itself from mere rumor to mere guesses for iPad 5 and the iPad mini 2, though with just as much assurance.
The U.S. military's reliance on foreign-made products, including telecommunications equipment and semiconductors, is putting the nation's security at risk by exposing agencies to faulty parts and to the possibility that producing nations will stop selling vital items, according to a new report from the Alliance for American Manufacturing.
The network at one of the biggest annual networking shows is being subject to a series of distributed denial of service attacks (DDoS) creating the equivalent of 90 million sessions attempting to use the network at the same time, all as part of a controlled test of the Interop network.
Two U.S. senators will push Congress or President Barack Obama's administration to pursue trade and immigration sanctions against China and other countries that allegedly support cyberattacks on U.S. government agencies and businesses, the lawmakers said Wednesday.
A team of students from the University of New South Wales will be off to the US Black Hat Security conference in July after winning the annual Cyber Security Challenge Australia (CySCA).
Syria suffered another Internet and mobile communications outage that lasted for about 20 hours. Service was restored earlier today.
A 35-year-old Dutchman suspected of participating in a large DDoS attack on antispam organization Spamhaus was extradited from Spain to the Netherlands on Monday evening, the Dutch Public Prosecution Service said Wednesday.
A BigPond email scam has been flagged after a security professional received an email addressed to 'Dear BigPond User' which contained malicious links.
Fifty of the most popular websites visited by Australians will be searched by the Office of the Australian Information Commissioner (OAIC) to see if their privacy policies can be easily understood and accessed.
The development team behind the popular Nginx open-source Web server software released security updates on Tuesday to address a highly critical vulnerability that could be exploited by remote attackers to execute arbitrary code on susceptible servers.
A stealthy malicious software program is taking hold in some of the most popular Web servers, and researchers still don't know why.
A bill proposed in the U.S. Senate aims to block imports of products containing U.S. technology stolen online, a move that appears primarily directed at China.
You don't have to look further than the uprisings across the Arab world to recognize the power of social tools, and this transformative power applies to business as well. But for an enterprise social network (ESN) to be genuinely useful, it needs to go beyond the "Facebook for enterprise" model.
More than 20 percent of data brokers checked by the U.S. Federal Trade Commission allegedly violated a U.S. privacy law when sharing personal data with agency workers posing as companies wanting to purchase information.
BYOD brings out the classic problem between control of corporate information and individual freedom. It kicks it up to a whole new level because the devices belong to the users, but at least some of the apps and information belong to the company and as such need protection and policy enforcement.
The U.S. Department of Justice's copyright infringement case against file storage service Megaupload is "prosecutorial overreach" based on a misreading of U.S. law, the site's lawyers argue in a white paper released Tuesday.
An important vote on the future of the European Union's privacy laws has been delayed again.
Data centres, servers, storage and more are being combined for simplified management and cost savings. In this survey, ESG looks at the current and future trends surrounding today’s integrated computing solutions. Download to find out how organisations are more likely to see commit IT budgets to the purchase of integrated solutions. Read more.
When you think Open Source software, you may think of half-baked programs too hard to use, or perhaps lacking power. Well, think again. This Open ...
Allianz Shared Infrastructure Services SE (ASIC) wanted to replace its current suite of management tools, some of which had been developed in-house, with a standard solution for the management of 600 network components in its data centre, in order to reduce costs and further improve quality. Find out what approach they took download today.
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTTest EngineerVIC
- FTTechnical Business AnalystNSW
- FTLead Software EngineerSA
- FTOS Web Applications DeveloperNSW
- FTWeb Analyst - WebTrendsVIC
- FTQuality ManagerSA
- FTR&D EngineerSA
- FTSenior Python DeveloperNSW
- FTFlash / ActionScript Developer - ContractNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- CITRIX SYNERGY ’13: Look beyond Cloud infrastructure, says Liang
- CITRIX SYNERGY ’13: Christiancen highlights the need for collaboration
- CITRIX SYNERGY ’13: Devices will change how people work, says Duursma
- IN PICTURES: Citrix Solutions expo (49 photos)
- IN PICTURES: Citrix parties one more night with Maroon 5 ( +57 photos)
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia