SyTech, the hacked company, was working on research projects for the FSB, Russia's intelligence service.
Infrastructure limitations and high cost of services are among the challenges faced by educators, who often use their personal devices to support teaching activities, says study.
Prosecutors never proved former NSA contractor was the origin for the Shadow Brokers leak.
Kazakh government first wanted to intercept all HTTPS traffic way back in 2016, but they backed off after several lawsuits.
Half of the database, to be exact, the half the hacker released to local reporters over the last weekend.
What we think the public Internet is has already been replaced with a vision of the digital marketplace that’s more reflective of our society. So why are we trying to resuscitate a framework from another era?
Most of the attacks came from state-sponsored hacking groups in Iran, North Korea, and Russia.
New ElectionGuard SDK to be open-sourced on GitHub; provided for free to voting machine vendors.
Tirana's Pyramid building has had quite a journey since it was created to honor Albania's communist dictator.
The settlement would easily surpass the FTC's largest financial penalty to date.
Interoperability and workforce training to use more data in decision-making are at the core of projects underpinning the reform of the country's pension system.
Last chance for Europe's top human rights court to rule against dragnet surveillance programs.
State of Hesse says student and teacher information could be "exposed" to US spy agencies.
US mayors vow not to give in to more extortion demands following ransomware attacks.
US Coast Guard also shares a list of cybersecurity best practices for commercial vessels.
A list of the most dangerous, effective, and most well-known malware strains that have been developed by the cyber-security units of various countries' intelligence and military branches.
For the past few years, the FBI has been keeping a separate list of the US' most wanted cybercriminals. Time to take a look at who's still on it -- in no particular order.
Dozens of breaches, over a billion affected.
Many of the massive cyberattacks that have spread across the world in recent years were traced back or attributed to North Korea. Here are eleven examples.
Dozens of data breaches, millions of people affected.
Over two billion records were stolen in 2016 alone -- and the year isn't over yet.
In "go big or go home" world of tech, these products went home.
From improved connectivity to skills creation, we look into some of the technology benefits that Games host city Rio de Janeiro - as well as all of Brazil - will retain after the sporting competitions end.
After several failed attempts, SpaceX made a historic rocket landing in the middle of the ocean that could mean huge savings for commercial space travel.
Here's a look at some of the devices, platforms and technology US President Barack Obama uses to carry out his day-to-day presidential duties.
We pick the high-tech handset each of the presidential candidates should own. We're making galleries great again. It's going to be GREAT. YUGE even.
There are a lot of players in the mandatory data-retention debate. We look at who is for the legislation, and who is opposing it.
2014 was a pretty rough year from a cybersecurity perspective. So that means that 2015 will be better, right? Right? Yeah, not so much. We'll tell you why.
How the Internet of Everything will have an impact on education in the next years
You may think you know how scary government can get, but you ain't seen nothin' yet!
ZDNet's Tiernan Ray explains how police officers at the Orange County, California Sheriff's Department are trying out software created by Veritone Inc., that lets them compare crime scene images of a person to decades of mug shots in the computer. The department claims it is already helping to make breakthroughs in cases that otherwise might not be investigated at all. Read more: https://zd.net/2XzV8rS
As the trade dispute goes on, Chinese tech giant Huawei is pushing on with efforts in regions like the Balkans.
Attack took place after President Trump backed off from using conventional weapons to strike Iran.
Time for tech companies to take responsibility for the digital privacy mess they're created, says Apple chief. Read more: https://zd.net/31H1sfD
Meet Europe's new supercomputer: MareNostrum 5 takes on global rivals for power. Read more: https://zd.net/2ILlpJQ
Chinese military won't replace Windows with Linux, but develop a custom OS instead.
ZDNet's Danny Palmer sits down with TechRepublic's Karen Roby to break down exactly what GDPR is, what it does, and what the future looks like as its one-year anniversary approaches. Read more: https://zd.net/2X08kC1
More than 20 European fact-checking outlets are participating in Facebook's initiative.
WhatsApp patches a flaw that has been used to install spyware on Android and iPhone devices.
Gate-like checkpoints are being used to record biometrics and device digital fingerprints for Xinjiang residents.
Macedonia's startup ecosystem is growing, tapping into the skills of its youth. Read more: https://zd.net/2YdAFoH
Finnish digital prescriptions are now valid in neighboring Estonia, thanks to an EU health data initiative.
The industry faced backlash following last year’s wildfires and firefighter service throttling.
Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.
Microsoft is not known for educational computing tools, but with Office Mix it's turning PowerPoint into a tool for building online lessons.
Microsoft has changed the look and feel of its venerable browser while adding some much-needed security features.
WordPerfect 12.0 features a core stable of productivity apps but suffers from its poor handling of Microsoft files.
Heavyweights Motorola and Microsoft unite to produce the MPx200; a sleek, all-black clamshell smart phone. Read our Australian review.
Government : US