- NSA spying revelations have tired out China's Huawei
- Coding error protects some Android apps from Heartbleed
- While Heartbleed distracts, hackers hit US universities
- Espionage outpacing financial crime as better reporting improves security picture: Verizon
- Apple patches Secure Transport, but not because of Heartbleed
- USB Type-C: Simpler, faster and more powerful
- Data retention: Just like diamonds, metadata is forever
- Connected vehicle tech trial to start trucking on in NSW
- UPDATED: 4G in Australia: The state of the nation
- NBN Co hits 105Mbps in limited FTTN trial
Sen. Dianne Feinstein's (D-Calif.) claim that the CIA violated provisions of the Computer Fraud and Abuse Act when it accessed computers used by members of the Senate Intelligence Committee, could be hard to substantiate, according to a leading legal expert.
As the U.S. Secretary of Defense, Leon Panetta delivered strong warnings about the risks of cyberattacks on the country. His conviction that a possible 'cyber Pearl Harbor' may be looming has not tempered since leaving the post last year.
With some opening shots in a cyber component to the war of nerves in the Ukraine already fired, security analysts today offered a look at how a full-fledged cyberwar in the region would unfold.
The University of Texas at San Antonio (UTSA) tops a somewhat unexpected list of schools that are considered by security practitioners as the best in the country for cybersecurity courses and degree programs.
Technology trade groups faulted President Obama for not using his State of the Union address Tuesday night to address domestic and international concerns over the National Security Agency's surveillance programs.
Any effort to rein in the National Security Agency after its widespread spy activities were revealed in leaked documents must focus on more than simply limiting what personal data can be collected.
The remarkable success that Chinese state-sponsored groups have had in infiltrating U.S. government, military and corporate networks in recent years should not be mistaken as a sign of growing technical superiority over the U.S. in cyberspace, security experts said.
Applying Big Data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held here this week.
China is by far the most aggressive, but not the only, country attempting the sort of extensive cyberespionage described in security firm Mandiant's dramatic report, released this week.
More DDoS attacks on banks, cyberwarfare, and targeted attacks could well be in store in 2013, security experts warn.
Delivering more products, heightened quality and shortened customers with flawless execution and minimal business interruption defines your supply chain success. This report discusses a newly developed end-to-end solution with the right tools to efficiently procure, assemble, ship and deliver the goods your customers want, when they want them.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- Google will push mobile app installs in search and YouTube
- Salesforce at 15: Industry disruptor wards off midlife crisis
- Branded comments and shares a growing part of the social engagement mix for marketers
- 8 things we learnt about big data analytics from the Adobe Summit
- AdRoll secures US$70 million to ramp up retargeting platform development