Macs are banned from many government departments because there aren't any 'approved' applications to encrypt them. So why doesn't Apple CEO Steve Jobs do something about it?
When foreign markets are willing to pay twice as much for your exports, it's usually a good sign. Unfortunately for Australia, the goods being traded are compromised PCs — but why are Australians worth twice as much as Americans?
Would you be happier that Google collects data about your Internet history if you knew their log data was used to fight some seriously nasty worms?
Today, Symantec released Norton 360 Version 2.0, but I wonder whether the security giant has learned from its past mistakes?
Following a rash of Telstra customers reporting phishing attacks, the telco has issued advice on how to discern the real Telstra from fake ones -- but the advice it gives is more likely to help phishers than its customers.
Botnet operators have become public enemy number-one as consumers, businesses and governments fall foul to identity theft, DDoS attacks and spam. Yet no one appears to be able to stop the spread of bots -- except maybe the media.
If the Internet is God, and the browser my shepherd, I am a lost lamb who has been waiting for the Prophet to answer my call: What are those icon-less buttons at the bottom of Internet Explorer 7?
According to one security vendor, Mac users are at a crossroad this year: will or won't they prove to be as gullible as their PC cousins when it comes to security?
Does the improved credit card security offered by chip and PIN-embedded credit cards mean a future of greater personal liability?
A "jailbreak" Web site created earlier this week is already attracting hordes of iPhone and iPod Touch users who want to free their devices from the digital shackles attached by Jobs and co.
Microsoft is going to let everyone -- even people with an illegal pirate copy of Windows XP -- download IE7 because the software giant really cares about the safety and security of all Internet users. (But don't mention Firefox ...)
Is Apple keeping the iPod Touch and iPhone platform closed to third party developers to protect its impressive record on security?
The world of IT security is in chaos, with CSOs seemingly on the front lines of a full scale global cyberwar being fought out by government hackers, botnet-controlling criminal gangs and compromised Web sites. Can we ever hope to keep networks safe in such an environment?
The eyes of the world were on Australia this week as the APEC summit got underway in Sydney, and what they've seen is a city being held under virtual martial law — major roads blocked off, police cars outnumbering taxis and snipers openly hanging out on roof tops.
Sony has once again been outed for putting its customers at risk from attack by creating software that could help criminals hide malware on a PC.