A network time protocol security hole has been discovered and there are reports that exploits already exist for it and are being exploited.
Showing results 1 to 20 of 1,095
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
Companies are already seeing wearables around the workplace but it seems many haven't considered the wave of adoption that could be imminent — and the privacy and security issues it will raise.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
Research shows that small organizations are fast becoming the target of choice for cybercriminals, but many of these businesses have no idea how to approach data security.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
The online retail giant is seeking business opportunities beyond the warehouse, and the latest acquisition of the online comedy service underscores Amazon's goals.
Apple's deal with IBM will see a massive spike in uptake across the iPhone and iPad market, one Wall Street analyst says, at a time where iPad sales continue to stagnate.
There was a time, not long ago, when the biggest companies were cowed by the national security state. Now they aren't afraid to stand up for the rights and interests of their users.
Amazon is reportedly opening a brick-and-mortar retail store in time for the holiday shopping season, but details of what the online retail giant will offer in the location are still murky.
A new report on IT decision makers shows enterprise trust in cloud security at its lowest -- yet they're flocking to use it. OpenStack's Matt Joyce thinks it's fair to ask if everyone's gone nuts.
Apple is allowing third-party keyboards for the first time in iOS 8 and Swype, SwiftKey, Fleksy and TouchPal will be releasing the first 'iconless' apps for the iPhone and iPad today.
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
A draft document released by the Australian Department of Finance outlines requirements for government IT contractors to notify customers within 12 hours once they become aware of actual or suspected security incidents.
The tech giant's stock price has plummeted over the past 24 hours, sending Apple shares to a low not experienced since January.
USIS, which performs background checks for the Department of Homeland Security, revealed that it was hacked earlier this month. The same company vetted Edward Snowden for the government.
A new report says the majority of attacks experienced by higher education institutions come from malware infections, and most universities are ill equipped to prevent and handle such attacks.
A major contractor of the US Dept. of Homeland Security suffers a major breach, months after it was accused of faking hundreds of thousands of background checks.
Target's security breach almost pales in comparison to what might be the largest swath of stolen Internet credentials ever.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)