A United Nations panel has approved a resolution that would have its General Assembly call on states to respect and protect the right to privacy in the digital age.
By John Ribeiro | 26 November, 2014 18:15
Australian Securities and Investments Commission chairperson Greg Medcraft has called for a focus on "cyber resilience through risk management" to prevent destabilisation of financial markets.
By Rohan Pearce | 26 November, 2014 15:39
Sony will offer partial refunds to customers to settle U.S. Federal Trade Commission charges that its ads in 2011 and 2012 for the PlayStation Vita console's cross-platform sharing and other features were deceiving.
By Tim Hornyak | 26 November, 2014 15:14
Cyber Monday is the biggest online shopping day of the year, which means it is also the single biggest opportunity for criminals to steal cash, personal information and credit card numbers, and they've got an imposing arsenal to carry out their plans against the unwary.
By Tim Greene | 26 November, 2014 13:45
Home Depot spent US$43 million in its third quarter dealing with the fallout of one of the largest ever data breaches, highlighting the costly nature of security failures.
By Jeremy Kirk | 26 November, 2014 12:50
Australian banks have begun rolling out debit and credit cards that feature a new eftpos chip designed to reduce fraud. The card features Europay, MasterCard and Visa (EMV) security.
By Computerworld Australia staff | 26 November, 2014 11:52
Chip-and-PIN payment cards have a strong supporter in the hotbed of payment technologies, with San Francisco's district attorney promoting the new technology as a way to cut down on fraud.
By Zach Miners | 26 November, 2014 11:16
Adobe released an emergency patch on Tuesday to fix a Flash Player vulnerability that was fixed last month but was quickly exploited again.
By Jeremy Kirk | 26 November, 2014 11:07
Australians who have fallen victim to cybercrime will be able to report the incident online via a new site called the Australian Cybercrime Online Reporting Network (ACORN).
By Hamish Barwick | 26 November, 2014 10:38
An industry consortium has released a roadmap that new recording technologies could yield 100TB hard drives in about 10 years.
By Lucas Mearian | 26 November, 2014 06:03
Antivirus firm Bitdefender unveiled a hardware security appliance for home networks Tuesday that aims to protect devices by scanning network traffic to detect and block potential security threats.
By Lucian Constantin | 26 November, 2014 04:29
U.S. Internet users have a limited understanding of what net neutrality means and what protections are contained in company privacy policies, according to the results of a national survey by the Pew Research Center.
By Grant Gross | 26 November, 2014 04:00
The U.K. has faulted an unnamed tech company for failing to flag a conversation that played a crucial role in planning the murder of a British soldier.
By Loek Essers | 26 November, 2014 03:04
Here's one flight delay that European Union citizens might appreciate: The European Parliament has grounded an agreement that would have sent more passenger data winging its way to Canadian law enforcers. And like other flight delays, it could have huge repercussions -- in this case for similar data exchange deals with the U.S. and Australia.
By Loek Essers | 26 November, 2014 01:43
BlackBerry's pitch to get back into the warm embrace of corporate IT shops seems logical enough at first glance: We're the most secure in mobile. Mobile is where all of your data and interactions are heading. Therefore you should give us all of your corporate business.
By Evan Schuman | 26 November, 2014 00:37
After Symantec blew the lid on Regin on Sunday, computer security experts and companies are revealing information that has lead to suspicions that the U.S. and U.K. are involved.
By Jeremy Kirk | 25 November, 2014 13:01
Affordable Internet access around the world should be a basic human right as it is essential for freedom of expression and economic opportunity, according to the results of a global survey released by the Centre for International Governance Innovation (CIGI).
By Hamish Barwick | 25 November, 2014 10:32
Regin, a complex and stealthy piece of espionage malware, steals passwords, logs keystrokes and can read, write, move and copy files, among other malicious activity, and has stunned the Symantec researchers that detailed it in a report.
By Tim Greene | 25 November, 2014 08:24
A federal court gave a green light last week to a lawsuit by a union and IT workers challenging a student visa work program, known as Optional Practical Training (OPT).
By Patrick Thibodeau | 25 November, 2014 08:13
Some 129 of 150 Australian and New Zealand websites audited by not-for-profit organisation Online Trust Alliance (OTA) failed to meet consumer protection, data privacy or cyber security criteria, according to a report released this week.
By Hamish Barwick | 25 November, 2014 08:01
In this White Paper, IDC offers up some quantifiable benefits that Asian enterprises have observed as a result of deploying backup and recovery solutions. · Many enterprises are finding that the backup and recovery processes and technologies that they have implemented have not kept pace with the demands of the business · IDC identifies how organizations can experience savings and improvements from the deployment of different types of technologies · The benefits fall into three categories: storage environment cost savings; end-user productivity enhancements; and IT staff productivity optimization
- FTAcquisition Marketing ExceutiveNSW
- CCTech Support | IT Services Firm - Ad hoc Projects - Echuca AreaVIC
- FTStudio Design ManagerVIC
- CCTech Support | IT Services Firm - Ad hoc Projects - Port Augusta / Whyalla AreaSA
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesVIC
- FTSearch/SEO/SEM/PPC - Multiple OpportunitiesNSW
- FTSenior SEO ManagerNSW
- FTStudio Design ManagerVIC
- FTProgram Manager - Integration & SolutionsNSW
- FTChief Information Officer - CSIROACT
With iOS 8, Apple has acknowledged the need for tighter IT controls through its addition of business-ready MDM features. But alone, they aren’t enough to meet enterprise security requirements. Get 5 tips to consider with new iOS 8 features.
- Here's why hydrogen-fueled cars aren't little Hindenburgs
- Kraken to help probe missing bitcoins in MtGox liquidation
- UN committee calls on countries to protect right to privacy
- ASIC chief calls for focus on 'cyber resilience'
- Sony to offer refunds over misleading PS Vita ads
- NSW Rural Fire Service cuts travel costs by using video conferencing
- How multisig can alleviate Bitcoin consumer protection concerns
- Treat Bitcoin like currency, advocates tell Senate inquiry
- Hack the halls: Watch out for Cyber Monday scamathon
- NASA creates first 3D printed object in space
- Home Depot spent $43 million on data breach in just one quarter
- Breaking up is hard to do, but HP won't look back
- New eftpos debit, credit chip cards include EMV security
- San Francisco DA pushes for chip payment cards in tech's backyard
- Adobe tries again to fix Flash vulnerability