- Blame Heartbleed: HealthCare.gov requires users to change their passwords
- Major security flaws threaten satellite communications
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Chrome OS may kill the password with Easy Unlock smartphone option
- Hackers try to blackmail plastic surgeon after stealing 500,000 patient records
- Galaxy S5 deep-dive review: Long on hype, short on delivery
- NBN Co hits 105Mbps in limited FTTN trial
- Telcos seek to strengthen NBN Co wholesale restrictions
- UPDATED: 4G in Australia: The state of the nation
- TPG should pay rural levy for each FTTB service: NBN Co
IBM in pictures
Falling hardware sales and the cost of layoffs hit IBM's profit hard in the first quarter, sending it down 21 percent from a year earlier.
Enterprise IT vendors are rushing to protect users from the Heartbleed bug, which has been found in some servers and networking gear and could allow attackers to steal critical data -- including passwords and encryption keys -- from the memories of exposed systems.
Continuing its run of digital marketer acquisitions, IBM has announced its purchase of Silverpop, which specializes in managing personally-customized Internet promotions.
IBM has come up with a technology for reducing the risk of data being exposed in mobile push notifications to mobile devices by coming up with a way to encrypt that information so service providers and others can't actually see any data related to the user's mobile device.
Former IBM Asia Pacific application services general manager Seelan Nayagam has moved to CSC to become its new Australian managing director and general manager.
Lenovo's deal to buy IBM's x86 server business for $2.3 billion gives the Beijing company another tech segment where it can expand beyond PCs, smartphones, tablets and smart TVs.
Between complex licenses and the cloud, Microsoft, Oracle, and SAP have lots of ways to hike up prices. Here's how to fight back
For decades, scientists have fantasized about creating robots with brain-like intelligence. This year, researchers tempted by that dream made great progress on achieving what has been called the holy grail of computing.
Microsoft today used the hoary practice of predicting next year to drive another nail into Windows XP's coffin.
IT job seekers embrace social media, video and graphics to enhance their resumes and set themselves apart from other job applicants.
In the second half of 2013, the advancement of security breaches across all industries continued to rise. Within this report, we’ll explain how more than half a billion records of personally identifiable information (PII) such as names, emails, credit card numbers and passwords were leaked in 2013 - and how these security incidents show no signs of stopping.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- In pictures: Customer 360 Symposium hits the Hunter Valley
- Why CMOs must embrace the seven principles of agile marketing
- Google opens the floodgates for new 'social' ads
- Telefónica starts exchange for targeted mobile ads
- Crowdsource guide ranks marketing automation platforms by user recommendations and company size