Build and manage your own school of magic and take on powerful wizards and sorcerers to become the most powerful mage in the kingdom.Schools...
Showing results 1 to 20 of 4,707
Security researchers have published proof-of-concept code for a major router vulnerability leveraging a popular Linux kernel driver that could be used by hackers to compromise millions of connected devices.
The team say tracking commuters on the metro is possible due to a lack of permissions required on Android phones.
Researchers have found that 500 milllion handsets may still leave users' personal details accessible even after a full factory reset.
Microsoft Research and Duke University are combining device graphics chips with those in the cloud to cut mobile broadband usage for streamed applications by up to 83 percent.
Security researchers warn that it may make phishing far more effective.
Biomedical News which keeps users up to date with current findings in biomedical research. It makes reading easy as it summarises research...
Researchers have discovered a botnet which comprises of tens of thousands of hijacked home routers.
Security researchers say the zero-day flaw affects "millions" of machines in datacenters around the world.
SmartyPal: The Good Screen!SmartyPal was created by parents for parents. SmartyPal improves the quality of our childrens screen time,...
Researchers claim that most cyberattackers targeting SAP applications use one of three major cyberattack vectors.
Free Android apps often hit external sites for advertising data. But one app touching 2,000 different sites? That's not ideal, note researchers with an app of their own to raise awareness.
Data protection vendor reveals plans to embark on joint initiatives with Singapore's R&D agency, A*Star, when it officially launches its research facility in the country by June 2015.
Innovation is vital to business success. Tech Pro Research surveyed 353 respondents to find out more about the value of innovation to their organization.
Sponsored by Microsoft Cloud
A look at specific use cases where cloud data is fueling medical research and leading to improved outcomes.
OS X may have a better security reputation than Windows, but it's far from perfect.
A new technique devised by researchers at Australia's Swinburn University of Technology could help make the sort of 3D holographic displays that feature in sci-fi movies like Star Wars and Avatar a reality.
The bug should've been squashed in the latest update of OS X 10.10.3, but researchers say it persists. Every Mac is at risk from this "backdoor" bug.
Palo Alto Networks, McAfee, Websense gateway systems allow malicious traffic to slip through the net
Researchers claim a number of high-profile gateway solutions do little to interrupt or prevent malicious communications.
Researchers who report vulnerabilities in Dropbox software can expect a cash reward.
Researchers claim a flaw that's existed for two-decades even affects the yet-to-be-released Windows 10. But Microsoft downplayed the severity of the vulnerability.
Industry cloud is an up-and-coming element within cloud computing. A Tech Pro Research survey shows that only 20 percent have ruled out using industry cloud within their organization.
Researchers' claims that the New South Wales online iVote system was vulnerable to a FREAK attack have been overstated, according to the state's Electoral Commission, which has questioned the researchers' motives.
The best of ZDNet, delivered
- 1 ZDNet Cloud TV: Hurdles to overcome (highlights)
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 34 ways to improve your iPhone's battery life
- 4 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 5 So you have an app idea and want to make a bajillion bucks