Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Showing results 1 to 20 of 702
After the torrent search website's closure last week, Isohunt has stepped into the breach by relaunching The Pirate Bay's database.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
At the Amazon Web Services (AWS) re:Invent conference in Las Vegas this week, AWS announced several important services. But most important is Amazon Aurora, a new high-performance database engine.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Windows 10 will build in standards-based two-factor authentication to every device, effectively neutering most phishing attacks and password database breaches. The company also announced new features aimed at securing corporate machines from malware attacks and data leaks.
Sponsored by Redhat
Modern datacenters and next-generation IT requirements depend on capable platforms, with open source solutions offering a strong foundation for open hybrid cloud and enterprise workloads. A powerful, unified platform enables enterprises to use a solid foundation to balance demand while utilizing new trends and technologies such as virtual machines and the open hybrid cloud.
The deal brings AT&T's NetBond service to IBM's SoftLayer cloud platform to bolster security and performance in hybrid cloud environments.
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
A draft document released by the Australian Department of Finance outlines requirements for government IT contractors to notify customers within 12 hours once they become aware of actual or suspected security incidents.
The tech giant's stock price has plummeted over the past 24 hours, sending Apple shares to a low not experienced since January.
UPDATED. Google is consciously using their influence to push certificate authorities to advance security standards soon. Would you believe the problem is Windows XP SP2?
Challenges to IoT include the need for more robust standards and more power to devices, as well as security and privacy concerns.
USIS, which performs background checks for the Department of Homeland Security, revealed that it was hacked earlier this month. The same company vetted Edward Snowden for the government.
Couchbase is hailing its new beta as the most significant release of the open-source NoSQL database ever, with development, administration and security the main beneficiaries.
What's a developer to do when a high-performance - but very small - database is needed for a project? FairCom believes that its c-treeACE family of navigational databases can be the solution.
A major contractor of the US Dept. of Homeland Security suffers a major breach, months after it was accused of faking hundreds of thousands of background checks.
Target's security breach almost pales in comparison to what might be the largest swath of stolen Internet credentials ever.
If you dined at one of these specific restaurants, your credit card details may have been stolen.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)