Redmond has said that the FREAK security flaw is found in versions of its Windows operating system from Windows Server 2003, Windows Vista, and higher.
Showing results 1 to 20 of 33,066
Customers of Telstra will be able to request the same metadata that law-enforcement agencies are able to access, the telco has said.
Did she do anything wrong? Were federal record-keeping laws broken? Was security compromised? Email expert and presidential scholar David Gewirtz deconstructs Hillary Clinton's emailgate.
For years, Oracle has tormented Windows users by bundling adware with its Java installer for Windows PCs. Now Oracle has begun including the same adware as part of a default installation of Java for the Mac, using the same deceptive techniques.
Adobe, maker of software including Flash and Adobe reader, is catching up to the times and has launched a bug bounty program -- but something may be missing.
'Building AI is like launching a rocket': Meet the man fighting to stop artificial intelligence destroying humanity
Skype's co-founder wants to keep humankind safe from the existential threats of artificial intelligence.
New Zealand's Government Communications Security Bureau has targeted the entire communications of nearly two dozen countries, new documents from NSA whistleblower Edward Snowden suggest.
Hillary Rodham Clinton is in one big email mess, but if you zoom out and look at her as any other employee you have a leading example of shadow IT at play.
The growth in the server market remains with the white box manufacturers that are supplying hyperscale cloud providers. Will the top guns---HP, IBM, Dell, Cisco and Lenovo---have an answer?
Server market share growth increased with every manufacturer in the top five.
A new web crypto bug is affecting many Safari and Android users. Who's going to get the fix first?
Chrome version 42, expected in mid-April, will be the last version of Chrome for Android 4.0 Ice Cream Sandwich devices.
What's unclear is how far beyond SoftLayer IBM's OpenPOWER bare metal servers can go. Enterprises and other cloud providers will need to adopt OpenPOWER at scale to tip the data center balance.
FireEye's Dave Merkel said investment in technology, intelligence, and expertise will ensure that online attacks become 'manageable' for businesses.
More than one third of encrypted Websites are open to attack via the FREAK security hole.
China wants the encryption keys from U.S. technology companies as part of a counter-terrorism law. The draft law leaves U.S. tech giants with two options: Play ball or get out.
While Silent Circle's encrypted devices and services look tempting, there are now free end-to-end encryption services available.
Hackers will always get through...when they do, don't shut them out. Watch them for a few hours says security firm Cybereason...
AdaptiveMobile has uncovered a new mobile malware campaign which uses phone contacts to spread.
Internet of Things devices are not originally built to be robust against attacks, resulting in vulnerabilities that can lead to severe repercussions if left unchecked, such as data that's being collected and acted upon in Singapore's smart nation plan.
The best of ZDNet, delivered
- 1 33 ways to improve your iPhone's battery life
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 So you have an app idea and want to make a bajillion bucks