US agencies NSA, FBI and CISA, along with the UK's NCSC, accuse 'Cozy Bear' Russian APT group of campaigns against SolarWinds. Organisations are urged to patch the five VPN and cloud vulnerabilities being exploited in ongoing attacks.
The initiative is part of demonstrations to the government ahead of the upcoming fifth-generation spectrum auction
The plan outlines the framework for fostering research and development in the field and driving AI innovation to solve the country's key challenges.
The platform enables the assessment of potential security and privacy gaps and aims to educate professionals working with data processing.
Chinese vendors like Oppo, Huawei, and Xiaomi are pushing the limits of what a smartphone can do. But thanks to hostile import policies and unfounded fears, US consumers are the big losers.
Justice Breyer writes that you can copy-and-paste someone else’s source code into your version of software, as long as that software has the greater needs of the people at heart. OK, that’s interesting.
Research outlines the risks associated to the privatization of Dataprev and Serpro.
A Go Go Gadget solution to getting packages from drones to doorsteps safely.
People are spending a lot more time at home, using their products, and stuff is breaking down.
Organizations will be able to upgrade their operational systems through a centralized purchasing model
Tackling the climate emergency requires a fundamental change in the way governments think and operate, argue Ray Ison and Ed Straw.
The UK government wants citizens to have digital identities. Whether the public will be on board is another question.
The Chinese firm is not considered to be apt to supply equipment to the government's own set-up, to be built by the winners of the upcoming 5G auction.
China's leading quantum scientist unveiled what the country's objectives are for the next five years.
The city is spending $4 million over four years to migrate its legacy IT infrastructure to Google Cloud
A list of the most dangerous, effective, and most well-known malware strains that have been developed by the cyber-security units of various countries' intelligence and military branches.
For the past few years, the FBI has been keeping a separate list of the US' most wanted cybercriminals. Time to take a look at who's still on it -- in no particular order.
Dozens of breaches, over a billion affected.
Many of the massive cyberattacks that have spread across the world in recent years were traced back or attributed to North Korea. Here are eleven examples.
Dozens of data breaches, millions of people affected.
Over two billion records were stolen in 2016 alone -- and the year isn't over yet.
In "go big or go home" world of tech, these products went home.
From improved connectivity to skills creation, we look into some of the technology benefits that Games host city Rio de Janeiro - as well as all of Brazil - will retain after the sporting competitions end.
After several failed attempts, SpaceX made a historic rocket landing in the middle of the ocean that could mean huge savings for commercial space travel.
Here's a look at some of the devices, platforms and technology US President Barack Obama uses to carry out his day-to-day presidential duties.
We pick the high-tech handset each of the presidential candidates should own. We're making galleries great again. It's going to be GREAT. YUGE even.
There are a lot of players in the mandatory data-retention debate. We look at who is for the legislation, and who is opposing it.
2014 was a pretty rough year from a cybersecurity perspective. So that means that 2015 will be better, right? Right? Yeah, not so much. We'll tell you why.
How the Internet of Everything will have an impact on education in the next years
You may think you know how scary government can get, but you ain't seen nothin' yet!
In the dramatic close to over a decade of deliberation, the US Supreme Court decided copying some source code is fair use, if it makes a software interface work properly on a different platform. Did justices leave any ambiguity as to what that means in the long run? Because if they did, posits ZDNet’s Scott Fulton, they may have left open a major vulnerability in the nation’s copyright system – one that developers here and abroad could be eager to exploit. Read more: https://zd.net/3wPExhR
Daphné Leprince-Ringuet tells Karen Roby that tech companies are hard at work building digital vaccine certifications. But some major challenges remain, and they have nothing to do with technology. Read more: http://zd.net/3t4c9GU
ZDNet's Bill Detwiler talks with USAF Brig. Gen. (Ret) Steven Spano who is regional VP for Public Sector at Tableau about what the company's government customers are asking for in a data analytics platform.
Mayors' experiences are strikingly aligned in spite of deep divisions in the country.
General Data Protection Regulation, or GDPR, is here. Here's what it means, how it impacts individuals and businesses - and how to ensure compliance.
ZDNet's Stephanie Condon talks to Karen Roby about the SaaS-based system election officials use to track mailed-in ballots. Read more: https://zd.net/2EhAUe2
According to the GAO, 1.1 million payments went to dead people to reach that $1.4 billion tally, but the crux of the issue is data management across the US government.
An executive order from the White House challenges the legal protections for the content published by social media platforms such as Facebook, Twitter, YouTube, and Instagram.
StopCovid will not use the API put forward by Apple and Google.
Seven internet companies have asked the US House of Representatives to prohibit the warrantless collection of internet search and browsing history when it considers the USA FREEDOM Reauthorization Act.
Daphne Leprince-Ringuet explains that the UK's health services is going solo to develop a coronavirus contact-tracing app. Here is why. Read more: https://zd.net/2ziaC8E
NSA publishes guidance on choosing a secure teleworking service. Assessed tools include Slack, Zoom, Signal, Skype, more.
Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.
Microsoft is not known for educational computing tools, but with Office Mix it's turning PowerPoint into a tool for building online lessons.
Microsoft has changed the look and feel of its venerable browser while adding some much-needed security features.
WordPerfect 12.0 features a core stable of productivity apps but suffers from its poor handling of Microsoft files.
Heavyweights Motorola and Microsoft unite to produce the MPx200; a sleek, all-black clamshell smart phone. Read our Australian review.
Government : US