A collection of notable security news items for the week ending January 30, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Showing results 1 to 20 of 1,741
The Egg is a webserver; a storage device; a Wi-Fi hotspot; and, maybe, a security service. It makes the "mobile" Internet a reality: it fits in your pocket and runs all day on batteries.
Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
The mobile devices include a pair of Ultrabooks and feature optional palm-based biometric security features.
A collection of notable security news items for the week ending January 23, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
A collection of notable security news items for the week ending January 2, 2015. Covers enterprise, controversies, reports and more.
Hacker conference Chaos Communication Congress 31c3 is under way in Hamburg, Germany right now where three SS7 talks have revealed the ease of invasive cell phone surveillance.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
Australia's largest mobile provider Telstra has been fined AU$102,000 by the competition watchdog for not prominently detailing the full cost of a new iPhone 6 plan.
Is there a mobile privacy crisis? Symantec thinks so and has added features to Norton Mobile Security to save you from it.
Nokia has opened the doors to a new mobile security hub in the German capital.
Loss of a smartphone is reported in 10 percent of all thefts and robberies in the US. Secure your iPhone with Apple's activation lock and apply a security setting to your device now.
Coffee drinkers in Portland can now place a drink and food order on their iPhone, pay, then pick it up all without talking to a single person. Welcome to the future of mobile ordering.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
While 16GB iPhone models are popular with consumers, that's not enough memory to store all your photos, apps, and games. With T-Mobile you can get a 64GB iPhone 6 for the price of a 16GB model.
Want to avoid having your online accounts hacked? Enable two-factor authentication (2FA), a crucial security measure that requires an extra code when signing in from an unfamiliar device. In this post, I explain how to use a mobile app to make your accounts safer.
Red Hat's latest acquisition enhances its mobile app development platform with collaboration features that promote agility and increase security.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
The latest update to Apple's mobile software comes with performance improvements to its older devices, notably the iPhone 4s and the iPad 2.
A new index from the mobile security provider also suggests that iOS has regained its enterprise share from Android, accounting for 69 percent of enterprise device activations.
The best of ZDNet, delivered
- 1 Windows 10: You've got questions, I've got answers
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 Hands-on with Windows 10: Installing the latest Technical Preview
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)