- Blame Heartbleed: HealthCare.gov requires users to change their passwords
- Major security flaws threaten satellite communications
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Chrome OS may kill the password with Easy Unlock smartphone option
- Hackers try to blackmail plastic surgeon after stealing 500,000 patient records
- Galaxy S5 deep-dive review: Long on hype, short on delivery
- NBN Co hits 105Mbps in limited FTTN trial
- Telcos seek to strengthen NBN Co wholesale restrictions
- UPDATED: 4G in Australia: The state of the nation
- TPG should pay rural levy for each FTTB service: NBN Co
President Obama's National Broadband Plan has helped expand Internet access in the U.S., but needs to be updated to account better data protection needs.
In the wake of revelations exposed in classified National Security Agency documents leaked to reporters by Edward Snowden, Facebook must show its users that their data is safe from the prying eyes of government spies.
As the world still reels over reports of U.S. government surveillance of privately owned smartphones, a spyware industry is growing that's focused on helping employers monitor the ways smartphones and tablets are used by their workers. Parents are also interested in the service to track their children's smartphone use.
The U.S. National Security Agency has reportedly been working for the past several years on expanding its ability to infect computers with surveillance malware and creating a command-and-control infrastructure capable of managing millions of compromised systems at a time.
Two recently-discovered flaws in Apple iOS and Mac OS X have security experts openly asking whether the software vulnerabilities represent backdoors inserted for purposes of cyber-espionage. There's no clear answer so far, but it just shows that anxiety about state-sponsored surveillance is running high.
A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
The NSA is spending some $80 million in basic research on quantum computing, money that may ultimately help commercialize quantum computing for the private sector.
Any effort to rein in the National Security Agency after its widespread spy activities were revealed in leaked documents must focus on more than simply limiting what personal data can be collected.
Edward Snowden's revelations about the U.S. government's data collection program could cause U.S. providers of cloud-based services to lose 10% to 20% of the foreign market to overseas rivals.
A defiant Edward Snowden resurfaced in Hong Kong today vowing to fight any U.S. efforts to extradite him on charges that he leaked classified documents describing two secret government data collection programs.
This whitepaper is the third in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section refers to case studies of different approaches to deploying protection architecture, including an enterprise customer scenario, an FSI customer scenario and an SMB customer scenario. The paper explains how these options should provide the flexibility and needed to combat the modern DDoS threat.
Why do we continue to pay the earth for global roaming? With Telstra increasing global roaming charges by 100-500% in over 180 countries, bill shock can only get worse. This paper investigates why, what and how your company can address the need for global coverage.
- In pictures: Customer 360 Symposium hits the Hunter Valley
- Why CMOs must embrace the seven principles of agile marketing
- Google opens the floodgates for new 'social' ads
- Telefónica starts exchange for targeted mobile ads
- Crowdsource guide ranks marketing automation platforms by user recommendations and company size