Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
Showing results 1 to 20 of 2,034
Catering for enterprise mobility requirements requires more than just device delivery, says HP's mobility business unit chief Michael Park, while delivering details on eight new devices aimed at a range of business markets.
Think that keeping hackers out of your digital fortress is already hard work, or that that BYOD is a security timebomb waiting to blow up in your face? Well, here's something new for you to worry about - a $10 USB charger that features a built-in wireless keylogger.
Although Docker container technology has rocketed in popularity, new research from Gartner suggests its rapid rise hasn't necessarily outstripped its security features.
Regardless whether they are in the home or the office, Cisco's priority for the International CES and beyond is to serve as the backbone for any products interested in linking up to wireless networks.
Hacker conference Chaos Communication Congress 31c3 is under way in Hamburg, Germany right now where three SS7 talks have revealed the ease of invasive cell phone surveillance.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
The Australian Communications and Media Authority has launched its Australian Internet Security Initiative portal to give internet service providers access to information about what IPs in their networks are infected by malware.
Symantec wasn't the only company following Regin. Kaspersky and F-Secure have something to say about who was hit. Regin also spies on GSM cellular networks.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
Research shows that small organizations are fast becoming the target of choice for cybercriminals, but many of these businesses have no idea how to approach data security.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
The 14th annual conference of international research networks last month was the scene of some startling demonstrations of the future of open-source networking.
Security concerns of midsize businesses are preventing them from taking full advantage of cloud, mobility, and big data.
Tech Pro Research's latest report shows how the technology landscape will evolve over the next three years, identifying the products and vendors that will stay relevant, and those that will become obsolete.
New McAfee research claims that a worrying number of organizations are turning off advanced firewall features in order to avoid slowing down networks.
As China and Europe plough research dollars into 5G, the pair have thrashed out a key trade agreement over mobile networks that should make cooperation a little easier.
Security, document management, open architecture and the ability to manage users over devices are critical components when picking an enterprise mobility management platform. But focus will matter too.
Researchers are looking at how to fix the security flaws in the industrial control systems that run power stations, rail networks and the electricity grid.
The best of ZDNet, delivered
- 1 Windows 10: You've got questions, I've got answers
- 2 Hands-on with Windows 10: Installing the latest Technical Preview
- 3 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)