Finally some innovation and progress in network security after years of siege mentality - map IT topography, label and write security policy for the modern digital world
Showing results 1 to 20 of 1,497
Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
A Chinese official has said that Apple CEO Tim Cook agreed to have Apple products inspected by Chinese network experts to ensure information safety and national security.
Potential security vulnerabilities found in the NSW roads management network could lead to accidents and vehicle congestion, according to a new report by the NSW auditor-general.
Distributed Denial of Service (DDoS) and routing attacks on online infrastructure increased last year according to a European agency for network security.
Although Docker container technology has rocketed in popularity, new research from Gartner suggests its rapid rise hasn't necessarily outstripped its security features.
Hacker conference Chaos Communication Congress 31c3 is under way in Hamburg, Germany right now where three SS7 talks have revealed the ease of invasive cell phone surveillance.
Apple has issued a security update to address a critical security issue with OS X's Network Time Protocol service.
A network time protocol security hole has been discovered and there are reports that exploits already exist for it and are being used in attacks.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
What value can be placed on the letter 'S'? If it's the 'S' in HTTPS, it could equate to a loss of productivity due to increased latency, greater battery drain for certain connected devices, and the loss of in-network value-added services, according to new research.
As part of its FutureScape prediction series for 2015, IDC looked at the impending IoT space from a broad spectrum of angles, including network capacity, security and cloud.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
The National Security Agency has released a new open-source program for data network interoperability.
Symantec wasn't the only company following Regin. Kaspersky and F-Secure have something to say about who was hit. Regin also spies on GSM cellular networks.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
Research shows that small organizations are fast becoming the target of choice for cybercriminals, but many of these businesses have no idea how to approach data security.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
A quantum communication network will first link the 2,000 kilometres from Beijing to Shanghai by 2016, with the country also vowing to build a global network by 2030.
Tech Pro Research's latest report shows how the technology landscape will evolve over the next three years, identifying the products and vendors that will stay relevant, and those that will become obsolete.
The best of ZDNet, delivered
- 1 Windows 10: You've got questions, I've got answers
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 Hands-on with Windows 10: Installing the latest Technical Preview
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)