Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
Showing results 1 to 20 of 669
Today's smartphones and tablets offer computing power, memory and storage that surpass that offered by mainframe computers in the 1990s. But security remains an ongoing challenge.
Government has invested significant resources to build a "smart nation" supported by big data analytics, but it also needs to dedicate sufficient effort in addressing data security and privacy concerns.
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) tightens the security screws in Windows and applications. It's set up for enterprise deployment and management.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Apart from IT infrastructure resources consolidation and security enhancements, Asian businesses will also be spending on IT-enabled innovation, social apps, and data analytics, reveals IDC survey.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Recently appointed Azure CTO Mark Russinovich spells out Microsoft's espousal of the container cause on its cloud computing platform and his reservations about Docker security.
UPDATED: It's likely that large cloud computing players will have to adopt a security patching cadence similar to the one used by the software industry. In the future, the cloud will have its version of Patch Tuesday.
Sponsored by Redhat and Intel
The advent of visualization and cloud computing has eliminated physical bonds between users and IT infrastructure, leading to an entirely new set of IT security challenges for the enterprise.
In the red hot cloud computing market, major players such as Cisco, Dell, HP, IBM and VMware now offer their own distribution of OpenStack. Meanwhile, Piston Cloud is playing its security, management and installation as differentiators. Will it work?
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
The Australian government is ramping up border security control at Australian airports with the deployment of 62 automated departure eGates.
A draft document released by the Australian Department of Finance outlines requirements for government IT contractors to notify customers within 12 hours once they become aware of actual or suspected security incidents.
The tech giant's stock price has plummeted over the past 24 hours, sending Apple shares to a low not experienced since January.
USIS, which performs background checks for the Department of Homeland Security, revealed that it was hacked earlier this month. The same company vetted Edward Snowden for the government.
The Inspector-General of Intelligence and Security has said it will need additional resources to oversee new powers planned for Australian intelligence agencies to access computers and networks during investigations.
A major contractor of the US Dept. of Homeland Security suffers a major breach, months after it was accused of faking hundreds of thousands of background checks.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 Hands-on with Windows 10: Installing the latest Technical Preview
- 3 Windows 10: You've got questions, I've got answers
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)