Key business areas where the outcomes of blockchain efforts can be measured.
She believes that as businesses look to scale artificial intelligence, quantum computing, and blockchain, "100% of jobs will change in the future".
With privacy and security concerns still plaguing My Health Record, Gartner fellow and VP David Furlonger ponders a future where blockchain could actually help.
Fans of social media site Tsu are eagerly awaiting its re-launch. But what will be different to the previous version of the platform?
Virtual assets, including cryptocurrency, are now on law enforcement’s radar.
President Xi’s recent instructions on blockchain also show that the Chinese government and relevant institutions are embracing new technology trends at a very rapid pace. After AI, China has great ambitions for blockchain technologies.
The social media giant says its plans could do for money what the internet did for data. But not everyone is convinced.
Fifty years after sending the first internet message, scientist Leonard Kleinrock has gone back to the drawing board with a plan for how to save the internet from fake news and abusive social networks and everything else that ails it. Kleinrock spoke with ZDNet in an exclusive interview about his plans for a new blockchain based on personal reputation.
What would happen if Twitter or Facebook removed your account, deleted your posts, and silenced your communications? New app Twetch, built for the blockchain, aims to solve that issue.
The US House Committee on Financial Services Chairperson has called for policymakers to consider whether Facebook should be broken up.
ING said its zero knowledge proof notary service evaluates the validity of a transaction without revealing anything else about it.
While blockchain solutions are maturing, most business and technology decision makers are unclear as to how blockchain can deliver actual business value to their organization.
Bulgaria is on its way to becoming a leading fintech technology hub in southeast Europe.
The Securities and Exchange Commission has taken emergency action to halt the digital token offering that has already raised $1.7 billion.
The Perth Mint Gold Token is touted as the first digital gold token on a public blockchain to be backed by government-guaranteed gold.
Interested in the world of cybersecurity? Consider picking up a copy of these books to enjoy over summer.
For the past few years, the FBI has been keeping a separate list of the US' most wanted cybercriminals. Time to take a look at who's still on it -- in no particular order.
Your iPhone and iPad is likely packed with important, valuable, and even sensitive information that you might not want others to be able to access. Here are the steps you should take to lock down an iPhone or iPad running iOS 12.3.
Your iPhone and iPad is likely packed with important, valuable, and even sensitive information that you might not want others to be able to access. Here are the steps you should take to lock down an iPhone or iPad running iOS 12.2.
What would a modern-day Plague of Lice look like?
The technology managing the systems in our cars could be open drivers up to the risk of hacking. Find out the most common digital threats to our cars, and how you can reduce your risk.
This gallery contains a list of the technologies that have been many times at the heart of a large number of data breaches incidents in the past few years.
Time and time again, Facebook has been slammed for privacy practices and data handling. Here are some of the most prominent, recent scandals of note.
Whether you're in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. One of these could be your best bet.
Although hackers are getting more and more sophisticated, you can still recognize that something is not right online. NordVPN shares tips on spotting a phishing message -- and keep your online activities safe.
Bypassing passcodes, malware-laden apps, and inherent design flaws exposing almost all known mobile devices made up part of the security problems found in iOS and Android.
Everything from ICO scams to 51 percent attacks has plagued the cryptocurrency space over the course of this year.
Experts weigh in on what they believe will happen to the world of cybercrime, malware, and botnets in the coming year.
If you're looking for a fast, ultra-rugged, secure encrypted portable storage drive that's available in both HDD and SSD flavors, look no further than Apricorn's new Aegis Fortress L3.
Your iPhone and iPad is likely packed with important, valuable, and even sensitive information that you might not want others to be able to access. Here are the steps you should take to lock down an iPhone or iPad running iOS 12.1.
We've been taught to look out for that little padlock to ensure a website is secure. But it's dangerous to rely on just one detail.
Nation-state backed cyber groups have been responsible for major incidents over the last decade. And now more countries want the same power.
The student was allegedly building a custom Gentoo Linux distro for ISIS.
But .uk domain suspensions are actually slightly down for the first time in recent years.
US telcos receiving USF money could be forced to replace existing Huawei and ZTE equipment.
Travelers should use only AC charging ports, use USB no-data cables, or "USB condom" devices.
Google defends its Project Nightingale deal with Ascension, which involves access to detailed patient records.
Researchers show smart speakers can be controlled from afar with laser beams and instructed to open smart locks and garage doors.
PureLocker ransomware appears to have links to some of the most prolific cyber-criminal operations active in the world today.
Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.
An ideal backup tool for small businesses and larger enterprises alike, vmProtect 6 makes light work of protecting and rapidly recovering virtual machines on VMware vSphere hosts.
<p> King of the small business security market, <a href="http://www.sonicwall.com/uk">SonicWALL</a> recently added six new models to its popular <a href="http://www.sonicwall.com/uk/TZ_Series.html">TZ</a> range of UTM (Unified Threat Management) appliances, delivering a mix of enhanced functionality and improved performance. Designed to serve the one-man-band upwards, the new range is topped out by the TZ 210 which, as we discovered, neatly bridges the gap between SME and enterprise products — and at a price that the competition will find hard to match. </p>
McAfee Internet Security 2009 does a reasonable job, but it also leaves room for improvement.
As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.
Symantec Backup Exec System Recovery 8 provides flexibility when creating desktop and laptop backups. If you have high value data stored on your computer, then we think $106.53 is a reasonable price to ensure it's protected.
Symantec Backup Exec 12 allows complete system recovery and concentrates on continuous file/data protection. Though AU$1,795 may seem a lot of money for an application, Backup Exec might be worth the investment if you're using it for irreplaceable and highly valuable data.
Lavasoft Ad-Aware 2007 came in dead last in our CNET antispyware testing. Ad-Aware failed to detect half of the test spyware, and unlike nine out of the 10 other antispyware apps we reviewed in December 2007, left behind traces for all but one spyware.