Finally some innovation and progress in network security after years of siege mentality - map IT topography, label and write security policy for the modern digital world
Showing results 1 to 20 of 2,773
The Egg is a webserver; a storage device; a Wi-Fi hotspot; and, maybe, a security service. It makes the "mobile" Internet a reality: it fits in your pocket and runs all day on batteries.
Singtel says it will work with the telecoms equipment maker to identify possible applications of 5G networks for consumers and businesses, including trials for potential technologies on the mobile network.
Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
The mobile devices include a pair of Ultrabooks and feature optional palm-based biometric security features.
A collection of notable security news items for the week ending January 23, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Hutchison, owner of UK mobile network Three, is in exclusive talks to acquire rival O2 from its Spanish parent Telefonica, in a deal which would make it the country's largest mobile operator.
A Chinese official has said that Apple CEO Tim Cook agreed to have Apple products inspected by Chinese network experts to ensure information safety and national security.
Potential security vulnerabilities found in the NSW roads management network could lead to accidents and vehicle congestion, according to a new report by the NSW auditor-general.
Deploying complex, high performance applications both locally and in a cloud service provider's network can be very challenging. DivvyCloud believes that it has the solution to this problem.
Distributed Denial of Service (DDoS) and routing attacks on online infrastructure increased last year according to a European agency for network security.
Some Optus and Virgin customers in Queensland arrived at work an hour early due to a stuff up in the mobile network that sent clocks an hour forward.
It's been 30 years since the UK's first mobile phone call was placed using the Vodafone network and a very heavy handset. How times have changed.
A collection of notable security news items for the week ending January 2, 2015. Covers enterprise, controversies, reports and more.
Hacker conference Chaos Communication Congress 31c3 is under way in Hamburg, Germany right now where three SS7 talks have revealed the ease of invasive cell phone surveillance.
Apple has issued a security update to address a critical security issue with OS X's Network Time Protocol service.
A network time protocol security hole has been discovered and there are reports that exploits already exist for it and are being used in attacks.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Triple Zero will soon be able to automatically obtain the location of mobile callers using tower information shared by Australia's three mobile network operators.
Is there a mobile privacy crisis? Symantec thinks so and has added features to Norton Mobile Security to save you from it.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 Hands-on with Windows 10: Installing the latest Technical Preview
- 3 Windows 10: You've got questions, I've got answers
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)