Security firm Norman, investigating cyber-espionage-related to a Norwegian telecom company, the Pakastani government and others, says a lot of its findings lead to the word "Appin," which happens to be the name of a security outfit in India whose website indicates it does work for the Indian military.
NextDC (ASX: NXT) has received a quality management system certification from the International Organisation for Standardisation (ISO).
The Obama administration this week teamed with Cisco, Microsoft, HP and others to roll out what it called an "IT Training and Certification Partnership" designed to get thousands of service members into the information technology world.
Google this month paid a security researcher $31,336 for reporting a trio of bugs in Chrome.
Seven years ago today, Twitter was born when the first tweet was sent out, marking the arrival of a new way to communicate online. As long as you did so in less than 140 characters.
Cyber threats from larger, more advanced nations that have diplomatic relations with the United States focus on cyber espionage and theft. But Iran is a more irrational actor and is building a cyber capability that is retaliatory in nature.
Companies could be exposing the crown jewels to malware and data breaches by not having a formal bring-your-own-device policy warns IDC Australia.
Hackers are adapting distributed denial of service (DDoS) attacks and combining these with social engineering tactics to try and infiltrate banks during 2013, warns Gartner.
Our team at Nominum recently looked at the biggest threats to fixed networks at the DNS layer. Why the DNS layer? Because it is ubiquitous -- every network runs on it -- and it is the best option for protecting critical infrastructure.
Five years after the disclosure of a serious vulnerability in the Domain Name System dubbed the Kaminsky bug, only a handful of U.S. ISPs, financial institutions or e-commerce companies have deployed DNS Security Extensions (DNSSEC ) to alleviate this threat.
Legislation, stealth technologies, and emerging data privacy markets are proving that the battle for our Internet privacy has only just begun
Sign up now »
When it comes to flash, “one size does not fit all.” IDC examines recent flash trends in enterprise storage deployments. This includes: highlighting how SSDs are filling in gaps of ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- AusCERT 2013: Introduction to Network Security Monitoring with Security Onion - AusCERT Presentation
- Auscert 2013: Perimeter protection has failed, encryption needs its day in the sun
- AusCERT 2013: Low-level analysis can find, map data deleted from Android phones
- Cybercrime Survey: Almost half of small business victims
- AusCERT 2013: Cloud-based scanner identifies new malware by its ancestry
- Lack of information, skills hinder finance-business partnering: Deloitte
- Rapid-growing mobile payments market is driving a financial fraud marketplace
- HP profit falls 32 per cent as PC and server sales decline
- Google launching new fund for later-stage tech investments
- Apple defends offshore decisions that result in low taxes