RankAttack technology does not submit your site to the search engines. Rather it creates a persona of popularity around your site...
Showing results 1 to 20 of 67
Apple technology today is accepted worldwide by consumers and businesses alike. Still, attacks against the Mac continue unabated with the same 30-year-old refrains.
Communications and information technology minister pinpointed the four nations as destinations from which hacking attacks were carried out against Indonesia's government Web sites.
Victoria's myki system has been shown to be immune to recent attacks on US transit ticketing systems that are based on the same technology.
Microsoft has patched a number of software flaws that could have led to information-stealing attacks by Duqu malware, according to security company Qualys.One of the critical 'Patch Tuesday' bulletins, MS12-034, addressed multiple Microsoft products that were vulnerable to the Duqu data-stealing malware, Qualys chief technology officer Wolfgang Kandek said in a statement on Tuesday.
Lessons from breach of its authentication technology earlier this year and resulting new security posture handy with stealth attacks on the rise, shares Art Coviello, the company's executive chairman.
Governments should require mandatory reporting of cybercrime to draw attention to the constant large-scale attacks on banking customers, according to Yuval Ben-Itzhak, the chief technology officer of security vendor AVG.
Chipmaker Intel is developing a security technology that its chief technology officer has claimed will defend against zero-day attacks at a hardware level.The technology will not be signature based and will be hardware based, Intel's chief technology officer Justin Rattner told Computerworld on Wednesday.
Sandboxing technology may help get the desktop exploitation attacks off the table so perhaps we can start to focus attention on the in-the-browser-walls attacks.
The security vendor's head of technology hits out at "doomsayers" of the Stuxnet worm and calls for more attention to be paid in dealing with everyday attacks.
The mobile apps that allow users to snap a picture of a check and upload it for deposit are available today largely because stemmed from the events of Sept. 11, 2001
Banks across Australia and Europe are struggling to prevent ATM bombings or identify a technology to reduce the attacks, according to Westpac.
The next major version of Adobe's PDF Reader will feature new sandboxing technology aimed at curbing a surge in malicious hacker attacks
Microsoft released an emergency patch to protect Internet Explorer users from a hole in technology used to build ActiveX controls and other web application components that has been targeted in attacks.
Mozilla's security engineers are working on new technology that promises to mitigate a large class of Web application vulnerabilities, especially the cross-site scripting (XSS) plague against modern Web browsers.The project, called Content Security Policy, is designed to shut down XSS attacks by providing a mechanism for sites to explicitly tell the browser which content is legitimate.
Technology giant IBM has taken independent security researchers to task for their role in making information about unpublished computer attacks available in an undisciplined manner.
Yesterday, Collin Mulliner of the trifinite.group, a group of computer experts researching insecurities in wireless communications, has released the slides as well as the research tools he came up with in order to demonstrate various attacks and vulnerabilities in Near Field Communication mobile phones, a technology that will change the face of mobile payments, and naturally result in more innovative mobile phishing and malware attempts.
Security experts have claimed that up to 90 percent of UK ATMs could be at risk from attacks such as worms or malware, as they rely on desktop PC technology
The New York Times is reporting that they obtained a copy of a report from US-CERT that attacks eminating from Chinese IP addresses successfully targeted employees of Oak Ridge National Laboratory in Tennessee. In addition to research in energy, nanotechnology and "isotope production", Oak Ridgeprovides federal, state and local government agencies and departments with technology and expertise to support national and homeland security needs.
On our sister site TechRepublic, IT Security blogger Tom Olzak runs a guest column from technology and security author-consultant Deb Shinder.In her piece "VoIP threats: beyond eavesdropping," Deb runs through a list of VoIP security vulnerabilities: Denial of Service attacks, flooding and logic attacks, injected messages, call hijacking, and caller ID spoofing.
The federal government will spend AU$13.6 million over the next four years trying to protect consumers and businesses from "sophisticated and targeted attacks", according to the Minister for Communications, Information Technology and the Arts, Senator Helen Coonan.
The best of ZDNet, delivered
- 1 Windows 10: You've got questions, I've got answers
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 Hands-on with Windows 10: Installing the latest Technical Preview
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)