- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Chrome OS may kill the password with Easy Unlock smartphone option
- Hackers try to blackmail plastic surgeon after stealing 500,000 patient records
- Michaels says breach at its stores affected nearly 3M payment cards
- DDoS Attackers Change Techniques To Wallop Sites
- NBN Co hits 105Mbps in limited FTTN trial
- Galaxy S5 deep-dive review: Long on hype, short on delivery
- NBN Co seeks ‘early resolution’ of TPG fibre threat
- TPG should pay rural levy for each FTTB service: NBN Co
- USB Type-C: Simpler, faster and more powerful
Sen. Dianne Feinstein's (D-Calif.) claim that the CIA violated provisions of the Computer Fraud and Abuse Act when it accessed computers used by members of the Senate Intelligence Committee, could be hard to substantiate, according to a leading legal expert.
As the U.S. Secretary of Defense, Leon Panetta delivered strong warnings about the risks of cyberattacks on the country. His conviction that a possible 'cyber Pearl Harbor' may be looming has not tempered since leaving the post last year.
With some opening shots in a cyber component to the war of nerves in the Ukraine already fired, security analysts today offered a look at how a full-fledged cyberwar in the region would unfold.
The University of Texas at San Antonio (UTSA) tops a somewhat unexpected list of schools that are considered by security practitioners as the best in the country for cybersecurity courses and degree programs.
Technology trade groups faulted President Obama for not using his State of the Union address Tuesday night to address domestic and international concerns over the National Security Agency's surveillance programs.
Any effort to rein in the National Security Agency after its widespread spy activities were revealed in leaked documents must focus on more than simply limiting what personal data can be collected.
The remarkable success that Chinese state-sponsored groups have had in infiltrating U.S. government, military and corporate networks in recent years should not be mistaken as a sign of growing technical superiority over the U.S. in cyberspace, security experts said.
Applying Big Data approaches to information security can help enterprises build better situational awareness capabilities, but implementation could prove to be a major challenge, security experts said at the RSA Conference 2013 being held here this week.
China is by far the most aggressive, but not the only, country attempting the sort of extensive cyberespionage described in security firm Mandiant's dramatic report, released this week.
More DDoS attacks on banks, cyberwarfare, and targeted attacks could well be in store in 2013, security experts warn.
Mobile apps are the ultimate corporate dilemma: They turbo-charge productivity—but also bring significant security risks. How do you navigate the challenge and emerge with both? With a comprehensive approach to security.Learn the key areas to focus on as you build a mobile app security strategy.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- In pictures: Customer 360 Symposium hits the Hunter Valley
- Why CMOs must embrace the seven principles of agile marketing
- Google opens the floodgates for new 'social' ads
- Telefónica starts exchange for targeted mobile ads
- Crowdsource guide ranks marketing automation platforms by user recommendations and company size