A recent ITG research report indicates that people are adopting Apple Pay. Google Wallet is also doing better than expected and Apple's awareness of mobile payments may be helping.
Showing results 1 to 20 of 1,533
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Is there a mobile privacy crisis? Symantec thinks so and has added features to Norton Mobile Security to save you from it.
Nokia has opened the doors to a new mobile security hub in the German capital.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
Symantec wasn't the only company following Regin. Kaspersky and F-Secure have something to say about who was hit. Regin also spies on GSM cellular networks.
Want to avoid having your online accounts hacked? Enable two-factor authentication (2FA), a crucial security measure that requires an extra code when signing in from an unfamiliar device. In this post, I explain how to use a mobile app to make your accounts safer.
Red Hat's latest acquisition enhances its mobile app development platform with collaboration features that promote agility and increase security.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
Research shows that small organizations are fast becoming the target of choice for cybercriminals, but many of these businesses have no idea how to approach data security.
A new index from the mobile security provider also suggests that iOS has regained its enterprise share from Android, accounting for 69 percent of enterprise device activations.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Apple has overtaken Samsung in becoming the most powerful brand this year in the mobile market of China, a research report has showed.
Tech Pro Research's latest report shows how the technology landscape will evolve over the next three years, identifying the products and vendors that will stay relevant, and those that will become obsolete.
As China and Europe plough research dollars into 5G, the pair have thrashed out a key trade agreement over mobile networks that should make cooperation a little easier.
The Samsung Knox team boss tells how it all got started and how the Korean tech giant wants to evolve its touted mobile security solution for the global mobile workforces of today, reports ZDNet Korea's Cho Mu-hyun.
The mobile security provider says the platform eliminates security headaches by giving mid-market businesses a central location to access business apps.
Blackphone and communications security firm Silent Circle are offering hackers US$128 per security-related vulnerability found in its mobile operating system and associated platforms in a new bug bounty program.
Both security incidents occurred overnight involving a local mobile operator and entertainment company, putting customer data at risk and questioning the ability of enterprises in the country to adequately protect their clients.
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)