A network time protocol security hole has been discovered and there are reports that exploits already exist for it and are being used in attacks.
Showing results 1 to 20 of 1,058
Microsoft is releasing a number of new Power BI business intelligence features in preview form, as well as rolling out a new native Power BI app for iPad.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
Companies are already seeing wearables around the workplace but it seems many haven't considered the wave of adoption that could be imminent — and the privacy and security issues it will raise.
From drug cartels to passwords, security expert Brian Krebs weighs in on how to keep your personal data and bank account safe.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
Research shows that small organizations are fast becoming the target of choice for cybercriminals, but many of these businesses have no idea how to approach data security.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
In the war against online security, the bad guys are winning. They steal our passwords, brute-force decrypt them, and take our money. We need better passwords, but only if we can remember them. Here's how to do that.
Apple's deal with IBM will see a massive spike in uptake across the iPhone and iPad market, one Wall Street analyst says, at a time where iPad sales continue to stagnate.
There was a time, not long ago, when the biggest companies were cowed by the national security state. Now they aren't afraid to stand up for the rights and interests of their users.
A new report on IT decision makers shows enterprise trust in cloud security at its lowest -- yet they're flocking to use it. OpenStack's Matt Joyce thinks it's fair to ask if everyone's gone nuts.
Apple is allowing third-party keyboards for the first time in iOS 8 and Swype, SwiftKey, Fleksy and TouchPal will be releasing the first 'iconless' apps for the iPhone and iPad today.
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
A draft document released by the Australian Department of Finance outlines requirements for government IT contractors to notify customers within 12 hours once they become aware of actual or suspected security incidents.
The tech giant's stock price has plummeted over the past 24 hours, sending Apple shares to a low not experienced since January.
USIS, which performs background checks for the Department of Homeland Security, revealed that it was hacked earlier this month. The same company vetted Edward Snowden for the government.
A major contractor of the US Dept. of Homeland Security suffers a major breach, months after it was accused of faking hundreds of thousands of background checks.
Target's security breach almost pales in comparison to what might be the largest swath of stolen Internet credentials ever.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)