- Should Australians prepare for rubber-hose cryptanalysis?
- USB Type-C: Simpler, faster and more powerful
- Data retention: Just like diamonds, metadata is forever
- Connected vehicle tech trial to start trucking on in NSW
- UPDATED: 4G in Australia: The state of the nation
Worried about how the Heartbleed vulnerability may affect your personal accounts? A new tool may be of help.
The source code of TrueCrypt, a popular disk encryption tool, is not the most polished work of programming, but it has no critical flaws or intentional backdoors, security testers concluded in a report released Monday.
Websites that use encryption could be elevated in Google search results sometime in the future, according to The Wall Street Journal.
Jose Vildoza's 62-year-old father was using his old Windows computer when a warning in broken English flashed on the screen: your files have been encrypted.
Cybercriminals have been developing increasingly sophisticated malware that make use of Windows PowerShell scripts in an attempt to fly under the radar.
Simply being compliant is not enough to mitigate attacks and protect critical information. Organizations can reduce chances of compromise by shifting away from a compliance-driven approach. This guide provides the Top 20 Critical Security Controls (CSCs) developed by the SANS Institute to address the need for a risk-based approach to security.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- Amazon: A culture based on customer data
- Why it's time to make customer engagement about context, not campaigns
- Google will push mobile app installs in search and YouTube
- Salesforce at 15: Industry disruptor wards off midlife crisis
- Branded comments and shares a growing part of the social engagement mix for marketers