- Activism's slippery slope: Anonymous targets children's hospital
- New iPad rumor rollup for week ending April 23
- Apple users put at risk by 3-week delay between OS X and iOS patches, researchers say
- Tip of the Hat: Heartbleed prompts chastened tech giants to fund OpenSSL
- 'Francophoned' cybertheft operation reportedly back in action
- Should Australians prepare for rubber-hose cryptanalysis?
- Data retention: Just like diamonds, metadata is forever
- Google will push mobile app installs in search and YouTube
- Sorting the security standards
- UPDATED: 4G in Australia: The state of the nation
The security researcher who identified an admin backdoor in a range of routers last year has found that Netgear's patches don't adequately address the security issue.
NEC has launched a biometric security program that uses face recognition to unlock access to PCs.
Web application attacks, cyber-espionage and point-of-sale intrusions were among the top IT security threats in 2013, according to Verizon's latest annual report on data breach investigations.
Security researchers have found that many satellite communication systems have vulnerabilities and design flaws that can let remote attackers intercept, manipulate, block and in some cases take full control of critical communications.
Cybercriminals have started using a sophisticated Android Trojan app designed for e-banking fraud to target Facebook users, possibly in an attempt to bypass the two-factor authentication protection on the social network.
Apple's App Store, Google's Play store and other app stores are packed with apps that can compromise your security and privacy without you ever knowing anything bad happened. What's a mobile app user to do?
Developers being overly trusting is one of them.
Securing a hybrid cloud is not the same thing as deploying hybrid security products.
Security pros and government officials warn of a possible cyber 9/11 involving banks, utilities, other companies, or the Internet
An assessment of the information security department shows that it has a lot of growing up to do yet.
This paper discusses: • The growing challenge of maintaining information security in today’s evolving enterprise environment • Key advantages of desktop virtualization as an inherently more secure computing architecture • The top ten benefits of using desktop virtualization to strengthen information security • And how you can regain control and reduce risk without sacrificing business productivity and growth
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.