- Large scale attack hijacks routers through users' browsers
- Minecraft used as cover to push Android scareware apps on Google Play
- Android's reset function fails to delete data from Samsung and HTC smartphones
- Hacked Adult Friend Finder database offered for $17,000
- Significant virtual machine vulnerability has been hiding in floppy disk code for 11 years
A Brave New Security World
In the near future, it is anticipated that all aspects of information technology will be movable, dynamic, and interactive – the access, the data, the workload, and all computing. End users’ mobile devices will access and store hundreds of gigabytes of data. Virtual servers will mobilise computing power between network segments, data centers, and even outside of the corporate environment and into the public cloud, where computing power is offered as a utility.
Please supply your email address to access the content.
- Check out the NEW f5 Resource centre | New content, infographics, white papers and research
- Transition to the Agile Data Centre. Partnering with innovators to drive business and IT forward.
- Prevent – Detect – Mitigate. Advanced Threat Protection a multi layered approach to Security – Videos, Demos, Whitepapers.
- AusCERT2015 | st-5th June 2015 | Hear from Brian Krebs, Eva Galperin and Bruce Schneier - New registration packages
- Exclusive Networks APAC posts bumper growth in first quarter
- Ingram Micro launches professional and training services for Aussie resellers
- Symantec's Holtzhausen to head Veritas channel business across APJ
- Barracuda and Aerohive partner for BYOD security
- Cloud back-up is vital for reseller and MSP profitability: CloudBerry Lab
- Why optimisation is the name of the game at First
- Video, mobile show strong growth in IAB's Q1 online advertising report
- Twitter offers marketers objective-based advertising programs
- Coming to Firefox: Ads based on your browsing history
- Woolworths customer leader, Jess Gill, departs, following CMO out the door