The Egg is a webserver; a storage device; a Wi-Fi hotspot; and, maybe, a security service. It makes the "mobile" Internet a reality: it fits in your pocket and runs all day on batteries.
Showing results 1 to 20 of 1,579
Singtel says it will work with the telecoms equipment maker to identify possible applications of 5G networks for consumers and businesses, including trials for potential technologies on the mobile network.
Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
As we look at how software will be evolving, traditional PC applications and mobile apps have some substantial differences, key among them the depth and flexibility traditional applications offer that are often an anathema to mobile users.
The mobile devices include a pair of Ultrabooks and feature optional palm-based biometric security features.
A collection of notable security news items for the week ending January 23, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Developers can now incorporate Twitter's Digits white-label login offering to their mobile applications' companion websites, following the release of Digits login for web.
Sponsored by Red Hat and Intel
Mobile applications are the future, and it's important for enterprises to plan their business strategies with mobile in mind so they do not fall short in how they engage with customers and employees. By Charles Tang, program marketing manager, middleware, Red Hat Asia Pacific
Samsung's fourth quarter preliminary sales show the mobile unit may be improving, but the company will need to provide applications with real Internet of things intelligence if it wants to smooth out the feast or famine hardware business.
A collection of notable security news items for the week ending January 2, 2015. Covers enterprise, controversies, reports and more.
Hacker conference Chaos Communication Congress 31c3 is under way in Hamburg, Germany right now where three SS7 talks have revealed the ease of invasive cell phone surveillance.
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) tightens the security screws in Windows and applications. It's set up for enterprise deployment and management.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Is there a mobile privacy crisis? Symantec thinks so and has added features to Norton Mobile Security to save you from it.
Nokia has opened the doors to a new mobile security hub in the German capital.
Together with the launch of updated custom Android software PrivatOS, the handset maker has revealed a new store dedicated to security and privacy applications.
Australian telcos will need to hand over confidential network expansion plans to the government in order to be eligible for mobile network blackspot funding.
Microsoft has purchased email startup Acompli, which makes iOS and Android mobile e-mail applications, for an undisclosed amount.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
The ruling marks the first-ever criminal conviction concerning the advertisement and sale of mobile device spyware applications.
The best of ZDNet, delivered
- 1 Windows 10: You've got questions, I've got answers
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 Hands-on with Windows 10: Installing the latest Technical Preview
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)