The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
By Jaikumar Vijayan | 18 April, 2014 21:36
Let's face it: No matter what device you use, you're in danger. Security threats and malware lurk on Windows PCs, Macs, and Android and iOS devices. If you use more than one device -- like most of us do -- that makes it even more difficult and expensive to be vigilant and keep yourself safe.
By Preston Gralla | 04 April, 2014 01:00
Online tracking is on the rise, but efforts to create a practical Do Not Track policy have slowed to a crawl. Meanwhile, users and browser companies are taking matters into their own hands.
By Robert L. Mitchell | 02 April, 2014 22:19
Microsoft has pulled out the big guns - a fear-of-God approach - to scare users into dumping Windows XP, telling them the most popular tasks done on a PC will put them in the crosshairs of cyber criminals.
By Gregg Keizer | 26 March, 2014 16:06
Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane.
By Jaikumar Vijayan | 14 March, 2014 10:27
Apple has improved its security in recent years, but is it enough?
By Bob Violino | 10 March, 2014 11:04
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
By Marc Ferranti | 06 March, 2014 22:06
That someone had to take the fall for the massive breach at Target is neither surprising nor unexpected. The only question is whether more heads will roll in the aftermath of one the biggest data compromises in retail history.
By Jaikumar Vijayan | 05 March, 2014 21:27
When you don’t have the funds for a CSO or IT security manager, it can be tough to keep your business protected. This has led to the emergence of the 'other SaaS' — security-as-a-service — with vendors and managed security providers (MSPs) offering cloud-based threat management.
By Hamish Barwick | 04 March, 2014 12:01
As bitcoin values jumped in the last months of 2013, malware designed to steal the virtual currency exploded, security researchers from Dell SecureWorks said this week.
By Gregg Keizer | 28 February, 2014 20:36
In the battle between enterprises and malicious hackers, the bad guys are clearly winning, judging by the sheer number of people and exhibitors at the RSA security conference going on here this week.
By Jaikumar Vijayan | 26 February, 2014 12:41
Migrating U.S. payment systems to the Europay MasterCard Visa (EMV) smartcard standard could take significantly longer than envisioned and offer fewer security benefits than what's being touted by proponents of the technology.
By Jaikumar Vijayan | 11 February, 2014 12:13
, the open source software management company, picks the top 10 open source projects launched in the past year, based on stats collected from the
By Black Duck | 28 January, 2014 14:08
The recent data breaches at Target and Neiman Marcus have once again shown that compliance with the Payment Card Industry Data Security Standard (PCI DSS) is no guarantee against an intrusion.
By Jaikumar Vijayan | 24 January, 2014 21:29
Microsoft chairman praises Macintosh but never sees corporate buyers being a strong point for Apple
By InfoWorld staff | 24 January, 2014 11:06
A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
By Jaikumar Vijayan | 23 January, 2014 19:45
Retailers and banks must move quickly to figure out who should be responsible for better securing the payments system network or risk having Congress decide for them.
By Jaikumar Vijayan | 23 January, 2014 16:05
It's rare that a company would release internal data on drive failure rates -- even more so when that company, Backblaze, earns its living storing consumer data in the cloud. That makes the hard drive data released this week even more valuable.
By Lucas Mearian | 22 January, 2014 21:11
Your smartphone can be a beacon telling the world where you are, with increasing precision. Is that good commerce or bad privacy, or maybe a bit of both?
By Lamont Wood | 21 January, 2014 11:57
Target's acknowledgement Friday that personal data of 70 million people, not 40 million as previously thought, may have been exposed to hackers in a recent data breach raises new questions about the incident and how it could affect victims.
By Jaikumar Vijayan | 10 January, 2014 17:13
This whitepaper is the second in a three-part series on distributed denial of service attacks (DDoS) and multi-tier DDoS protection. This section details the design and capabilities of different forms of protection architecture designed for a variety of circumstances, while also providing alternative approaches. The paper also explains how to maintain availability, including network and application defense and DNS DDoS Mitigation.
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTContent StrategistNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTIT Support EngineerNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTOBIEE BI/DW ConsultantNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTDeliverability SpecialistNSW
Read how Perth-based safety footwear manufacturer, Steel Blue, was able to cut costs with shipping and improve efficiency while meeting the growing demand for their products as they expanded their national and export markets and increased their local market share, all thanks to a new ERP system.
- Google invites Glass wearers to brave LA's beaches
- Telerik frees HTML5 collection of components
- Space X rocket en route to ISS with space laser cargo
- AMD steers clear of low-cost tablet market
- Experts: Avoid big mistakes with Oracle's Exadata
- Steve Jobs' character becomes issue in Silicon Valley no-hiring case
- FCC vote on incentive auction plan could further open broadband competition
- Google tech to bring 3D mapping smarts to NASA's space station robots
- Plastic computers taking shape, but won't replace silicon
- Apple has bigger plans than just song ID with Shazam deal
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Americans cool with lab-grown organs, but not designer babies
- IE6: Retired but not dead yet
- Twitter to promote app downloads in mobile timelines
- Can you hear me now? NASA to test laser communication system