Think that keeping hackers out of your digital fortress is already hard work, or that that BYOD is a security timebomb waiting to blow up in your face? Well, here's something new for you to worry about - a $10 USB charger that features a built-in wireless keylogger.
Showing results 1 to 20 of 2,357
Although Docker container technology has rocketed in popularity, new research from Gartner suggests its rapid rise hasn't necessarily outstripped its security features.
Regardless whether they are in the home or the office, Cisco's priority for the International CES and beyond is to serve as the backbone for any products interested in linking up to wireless networks.
Hacker conference Chaos Communication Congress 31c3 is under way in Hamburg, Germany right now where three SS7 talks have revealed the ease of invasive cell phone surveillance.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
The Australian Communications and Media Authority has launched its Australian Internet Security Initiative portal to give internet service providers access to information about what IPs in their networks are infected by malware.
Symantec wasn't the only company following Regin. Kaspersky and F-Secure have something to say about who was hit. Regin also spies on GSM cellular networks.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
Research shows that small organizations are fast becoming the target of choice for cybercriminals, but many of these businesses have no idea how to approach data security.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
The 14th annual conference of international research networks last month was the scene of some startling demonstrations of the future of open-source networking.
Tech Pro Research's latest report shows how the technology landscape will evolve over the next three years, identifying the products and vendors that will stay relevant, and those that will become obsolete.
New McAfee research claims that a worrying number of organizations are turning off advanced firewall features in order to avoid slowing down networks.
As China and Europe plough research dollars into 5G, the pair have thrashed out a key trade agreement over mobile networks that should make cooperation a little easier.
Researchers are looking at how to fix the security flaws in the industrial control systems that run power stations, rail networks and the electricity grid.
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
The research firm claims that 75 percent of all mobile applications will fail basic security tests next year -- leaving the enterprise vulnerable.
Research firm Gartner says over 20 percent of enterprises will invest in security for business initiatives using Internet of Things devices by 2017.
Intel has signed a deal to acquire over 1,400 patents and patent applications registered by Powerwave Technologies, many of which relate to wireless telecommunications technology.