- Facebook users targeted by iBanking Android trojan app
- Microsoft extends Windows 8.1 Update migration deadline for business
- Government and private sector must share intelligence more effectively to avoid cyber threats
- Windows XP's retirement turns into major security project for Chinese firm
- Today's Approach to Security is Broken
- NBN Co hits 105Mbps in limited FTTN trial
- Telco deregulation: Price controls, phone sex on the table
- TPG should pay rural levy for each FTTB service: NBN Co
- NBN Co seeks ‘early resolution’ of TPG fibre threat
- USB Type-C: Simpler, faster and more powerful
Analysts are doubtful a Telstra bid to acquire Leighton’s telecom assets would make it to the finish line. Such a Telstra move could be a “blocking strategy” to stop an overseas player from coming in, Gartner analyst Geoff Johnson told Computerworld Australia.
This paper serves security professionals interested in better techniques for finding vulnerabilities, who have a solid understanding of networking principles and familiarity with the concepts related to hacking, vulnerabilities, and exploits. Read on for an in-depth view of the use of expert systems to achieve accurate and detailed vulnerability results.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- In pictures: Customer 360 Symposium hits the Hunter Valley
- Why CMOs must embrace the seven principles of agile marketing
- Google opens the floodgates for new 'social' ads
- Telefónica starts exchange for targeted mobile ads
- Crowdsource guide ranks marketing automation platforms by user recommendations and company size