The Australian Electoral Commission has cautioned a parliamentary inquiry about rushing to implement a federal electronic voting scheme.
By Rohan Pearce | 31 July, 2014 14:55
Federal government proposals to amend copyright laws have drawn support from rights holders and copyright organisations but some aspects of the enforcement regime outlined in a discussion paper released yesterday have raised concerns among ISPs and consumer advocates.
By Rohan Pearce | 31 July, 2014 13:02
A zero-day flaw in a software driver in Symantec's widely used Endpoint Protection product may be tricky to fix.
By Jeremy Kirk | 31 July, 2014 12:33
There's no immediate end in sight to trouble that has hit the U.S. State Department's computer system for processing visa applications and caused problems for thousands of people worldwide.
By Martyn Williams | 31 July, 2014 06:48
Hackers attacked the infrastructure of Tor, the anonymizing service, earlier this month in an incident that may have compromised a number of hidden services, according to an announcement posted today by the Tor Project's director, Roger Dingledine.
By Jon Gold | 31 July, 2014 05:32
A security audit of 10 popular Internet-connected devices - components of the so-called Internet of Things - identified an alarmingly high number of vulnerabilities.
By Lucian Constantin | 31 July, 2014 05:22
It's generally accepted that antivirus programs provide a necessary protection layer, but organizations should audit such products before deploying them on their systems because many of them contain serious vulnerabilities, a researcher warned.
By Lucian Constantin | 31 July, 2014 02:38
The EU court ruling that gives people the "right to be forgotten" by search engines is misguided in principle and unworkable in practice, said a U.K. House of Lords subcommittee Wednesday.
By Loek Essers | 31 July, 2014 00:08
Consumers in Australia and around the world have fallen for a social engineering link promising a free download of Transformers 4, 22 Jump Street or Maleficent.
By Hamish Barwick | 30 July, 2014 16:20
Attorney-General George Brandis and communications minister Malcolm Turnbull have opened a public consultation on changes to the enforcement of copyright law.
By Rohan Pearce | 30 July, 2014 15:40
An open-source project has released the first free application for the iPhone that scrambles voice calls, which would thwart government surveillance or eavesdropping by hackers.
By Jeremy Kirk | 30 July, 2014 14:39
Symantec's Endpoint Protection product has three zero-day flaws that could allow a logged-in user to move to a higher access level on a computer, according to a penetration testing and training company.
By Jeremy Kirk | 30 July, 2014 13:32
Banks are reminding consumers that they will no longer be able to sign when they make purchases on their debit and credit cards in Australia from 1 August 2014. Instead, people will need to use a PIN – part of a move to decrease card fraud in Australia.
By Hamish Barwick | 30 July, 2014 11:56
Now that BlackBerry has fallen significantly behind Apple and Google in the race to offer features and third-party apps for its smartphones, the company is concentrating on providing devices that, it claims, have the strongest available security -- the killer feature for the enterprise.
By Joab Jackson | 30 July, 2014 06:48
Setting corporate cyber-security policy and taking actions around it must be a top concern for the board of directors at any company, not just the information-technology division, the Department of Homeland Security (DHS) indicated as a high-level official there backed a private-sector effort to raise awareness at the board level.
By Ellen Messmer | 30 July, 2014 06:06
U.S. Senator Patrick Leahy has introduced a new version of a bill to rein in the National Security Agency's bulk collection of U.S. phone records in an effort to strengthen legislation that passed the House of Representatives this year.
By Grant Gross | 30 July, 2014 03:46
The IT infrastructure of the National Research Council of Canada was recently compromised by highly sophisticated Chinese state-sponsored hackers, the Canadian government said Tuesday.
By Lucian Constantin | 30 July, 2014 03:43
The majority of Android devices currently in use contain a vulnerability that allows malware to completely hijack installed apps and their data or even the entire device.
By Lucian Constantin | 30 July, 2014 00:32
U.S. and EU privacy and consumer groups called on privacy regulators to stop Facebook's plans to gather the Internet browsing patterns of its users while they visit other sites.
By Loek Essers | 29 July, 2014 20:42
A configuration problem in Facebook's popular Instagram application for Apple devices could allow a hacker to hijack a person's account if they're both on the same public Wi-Fi network.
By Jeremy Kirk | 29 July, 2014 15:47
A successful mobile deployment using ActiveSync depends on giving users a reliable, stable sync experience. But if any of the many moving parts in the EAS data path fail or degrade, the experience will suffer. Read this whitepaper to learn how to get ahead of EAS challenges by providing reliable mobile service—particularly for BYOD users.
- Electoral commission cautions against rush to e-voting
- Google makes Hangouts more enterprise friendly
- Stanford surgical students set sights on Google Glass
- Data#3 acquires 42.5% share in Discovery Technology
- Cheers and jeers over anti-piracy laws
- No patch yet for zero day in Symantec Endpoint Protection software driver
- Android grabs record 85 per cent smartphone share
- FCC chairman grills Verizon over data throttling
- Equity crowdfunding licence approved
- Intel's MinnowBoard Max coming in late, commanding higher prices
- Senate committee: Mobile phone 'cramming' widespread, profits carriers
- Oracle-based system for US visas still glitchy after software update
- Countries don't own their Internet domains, ICANN says
- Tor hints at possible U.S. government involvement in recent attack
- Internet of Things devices contain high number of vulnerabilities, study finds