Redmond has said that the FREAK security flaw is found in versions of its Windows operating system from Windows Server 2003, Windows Vista, and higher.
Showing results 1 to 20 of 29,280
Customers of Telstra will be able to request the same metadata that law-enforcement agencies are able to access, the telco has said.
The Silicon Valley startup is a joint effort between Stanford University and GE Ventures, with the goal of advancing evidence-based medicine through data and predictive analytics.
For years, Oracle has tormented Windows users by bundling adware with its Java installer for Windows PCs. Now Oracle has begun including the same adware as part of a default installation of Java for the Mac, using the same deceptive techniques.
Salesforce.com wants to turn marketers into data scientists with its latest addition to the Marketing Cloud.
Adobe, maker of software including Flash and Adobe reader, is catching up to the times and has launched a bug bounty program -- but something may be missing.
'Building AI is like launching a rocket': Meet the man fighting to stop artificial intelligence destroying humanity
Skype's co-founder wants to keep humankind safe from the existential threats of artificial intelligence.
Previously only available to Dropbox's early access program, the Groups and Groups API is being pushed out to wider availability.
Rackspace's ObjectRocket will hand the data management burden so Tinder can continue to just do its thing.
But 88 percent of hiring managers report that it's "very difficult" or "somewhat difficult" to find qualified candidates.
New Zealand's Government Communications Security Bureau has targeted the entire communications of nearly two dozen countries, new documents from NSA whistleblower Edward Snowden suggest.
Hillary Rodham Clinton is in one big email mess, but if you zoom out and look at her as any other employee you have a leading example of shadow IT at play.
A new web crypto bug is affecting many Safari and Android users. Who's going to get the fix first?
Chrome version 42, expected in mid-April, will be the last version of Chrome for Android 4.0 Ice Cream Sandwich devices.
FireEye's Dave Merkel said investment in technology, intelligence, and expertise will ensure that online attacks become 'manageable' for businesses.
More than one third of encrypted Websites are open to attack via the FREAK security hole.
China wants the encryption keys from U.S. technology companies as part of a counter-terrorism law. The draft law leaves U.S. tech giants with two options: Play ball or get out.
While Silent Circle's encrypted devices and services look tempting, there are now free end-to-end encryption services available.
Hackers will always get through...when they do, don't shut them out. Watch them for a few hours says security firm Cybereason...
AdaptiveMobile has uncovered a new mobile malware campaign which uses phone contacts to spread.
The best of ZDNet, delivered
- 1 33 ways to improve your iPhone's battery life
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 So you have an app idea and want to make a bajillion bucks