Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
Showing results 1 to 20 of 1,696
Although Docker container technology has rocketed in popularity, new research from Gartner suggests its rapid rise hasn't necessarily outstripped its security features.
QuickFire Networks' technology includes T-Video, an appliance that is designed to sit in a 1U rack and do nothing but process and transcode video. Welcome to Facebook's data centers.
Government has invested significant resources to build a "smart nation" supported by big data analytics, but it also needs to dedicate sufficient effort in addressing data security and privacy concerns.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Apart from IT infrastructure resources consolidation and security enhancements, Asian businesses will also be spending on IT-enabled innovation, social apps, and data analytics, reveals IDC survey.
Telstra will hand over ownership of its copper and hybrid fibre-coaxial networks to NBN Co for the multi-technology mix network under a new deal signed on Sunday.
Sony's security failure has been devastating, but the company is turning to technology in an attempt to halt downloads of its confidential data.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
The Australian Communications and Media Authority has launched its Australian Internet Security Initiative portal to give internet service providers access to information about what IPs in their networks are infected by malware.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Sponsored by Redhat and Intel
The Internet of Things is set to revolutionise the way business is conducted. Recognising security concerns and infrastructure requirements needed to support IoT integration now will ensure that your enterprise IT architecture is ready to benefit from this technology in the future.
Security concerns of midsize businesses are preventing them from taking full advantage of cloud, mobility, and big data.
Finance, security and healthcare are set to be the main sectors to use new graph analytics technology from software firm Actian.
Powerful Human Resources analytic tools were in abundance at the recent HR Technology show in Vegas. But can/will HR departments buy these solutions? Probably not -- unless the HR group itself changes.
Researchers are looking at how to fix the security flaws in the industrial control systems that run power stations, rail networks and the electricity grid.
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
A draft document released by the Australian Department of Finance outlines requirements for government IT contractors to notify customers within 12 hours once they become aware of actual or suspected security incidents.
The best of ZDNet, delivered
- 1 Windows 10: You've got questions, I've got answers
- 2 Hands-on with Windows 10: Installing the latest Technical Preview
- 3 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)