Finally some innovation and progress in network security after years of siege mentality - map IT topography, label and write security policy for the modern digital world
Showing results 1 to 20 of 3,521
Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
A study by IDC, commissioned by FireEye, has shown that organisations continue to be overwhelmed by security alerts, especially redundant ones, but they are turning to third-party IT security management to reduce the risk of missing critical alerts.
FireEye's latest report suggests that a number of businesses face over 10,000 cybersecurity alerts per month. What is being done to combat potential attacks?
A Chinese official has said that Apple CEO Tim Cook agreed to have Apple products inspected by Chinese network experts to ensure information safety and national security.
Potential security vulnerabilities found in the NSW roads management network could lead to accidents and vehicle congestion, according to a new report by the NSW auditor-general.
The social media network hopes ZipDial's 'missed call' technology will bring Twitter to those in emerging markets where Wi-Fi connections can be unstable.
On the back of its Ooyala acquisition, Telstra has continued its push to become a global technology company with the launch of a new video distribution network known as Global Media Switch.
Distributed Denial of Service (DDoS) and routing attacks on online infrastructure increased last year according to a European agency for network security.
After nearly a decade, Microsoft's Patch Tuesday has become part of a routine for security researchers and IT pros. But Google's new hard-line policy on disclosing security vulnerabilities added drama to this Patch Tuesday, and the fireworks will continue unless the two companies can synchronize their calendars.
Although Docker container technology has rocketed in popularity, new research from Gartner suggests its rapid rise hasn't necessarily outstripped its security features.
Several brilliant ex-HTC employees came together in an attempt to transform energy distribution and management in populous cities. The Gogoro Energy Network powers their first vehicle.
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) tightens the security screws in Windows and applications. It's set up for enterprise deployment and management.
Apple has issued a security update to address a critical security issue with OS X's Network Time Protocol service.
A network time protocol security hole has been discovered and there are reports that exploits already exist for it and are being used in attacks.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Telstra will hand over ownership of its copper and hybrid fibre-coaxial networks to NBN Co for the multi-technology mix network under a new deal signed on Sunday.
Sony's security failure has been devastating, but the company is turning to technology in an attempt to halt downloads of its confidential data.
Communications Minister Malcolm Turnbull has said that NBN Co will soon release an audited historical cost per premises passed for the fibre-to-the-home network to show the actual cost of the network rollout up until the multi-technology mix switch.
As part of its FutureScape prediction series for 2015, IDC looked at the impending IoT space from a broad spectrum of angles, including network capacity, security and cloud.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 Hands-on with Windows 10: Installing the latest Technical Preview
- 3 Windows 10: You've got questions, I've got answers
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)