- How to fix the two-factor authentication log-in error in Gmail on Android
- Tutorial: How to fix app store errors in Windows 8
- Brisbane to Gladstone yacht race fans track progress in real time
- Glass all gone after one-day sale, Google says
A federal court in New Jersey this week affirmed the Federal Trade Commission's contention that it can sue companies on charges related to data breaches, a major victory for the agency.
By Jaikumar Vijayan | 11 April, 2014 03:35
Civil liberties and privacy groups have long criticized the U.S. National Security Agency, but those critics became louder last summer after details of the agency's data collection activities were disclosed in classified documents leaked by Edward Snowden.
By Jaikumar Vijayan | 02 April, 2014 06:46
A new entry in the cash-for-bugs business, the Internet Bug Bounty, recently paid out its first $10,000 rewards.
By Gregg Keizer | 23 March, 2014 18:39
Companies that suffer major data breaches almost always portray themselves as victims of cutting edge attack techniques and tools. The reality, though, is often much more mundane.
By Jaikumar Vijayan | 14 March, 2014 10:27
Retailers and banks must move quickly to figure out who should be responsible for better securing the payments system network or risk having Congress decide for them.
By Jaikumar Vijayan | 23 January, 2014 16:05
Target's acknowledgement Friday that personal data of 70 million people, not 40 million as previously thought, may have been exposed to hackers in a recent data breach raises new questions about the incident and how it could affect victims.
By Jaikumar Vijayan | 10 January, 2014 17:13
Adobe on Thursday admitted that hackers broke into its network and stole personal information, including an estimated 2.9 million credit cards, illustrating the lucrative target that software-by-subscription providers have become to cyber criminals.
By Gregg Keizer | 07 October, 2013 11:03
Learn how every business can improve efficiency, compete better, and deliver compelling user experiences with flash. You'll also gain access to Gartner's 2013 Cool Vendor Report Download our ebook and learn how you can: - Improve efficiency - Compete better - Deliver compelling user experiences
- FTMicrosoft Business Intelligence ConsultantNSW
- FTContent StrategistNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTIT Support EngineerNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTOBIEE BI/DW ConsultantNSW
- FTDeliverability SpecialistNSW
The rise of BYOD is creating governance and regulatory nightmares while providing end users with unprecedented flexibility and agility. While IT is still intrigued by the possibility of a better desktop management model and the operational savings client virtualization software could deliver, it is the increased governance and the ability to deliver desktops, applications, and data to any device that are driving today's purchases.
- Microsoft takes Iowa from corn to .com
- Google invites Glass wearers to brave LA's beaches
- Telerik frees HTML5 collection of components
- Space X rocket en route to ISS with space laser cargo
- AMD steers clear of low-cost tablet market
- Experts: Avoid big mistakes with Oracle's Exadata
- Steve Jobs' character becomes issue in Silicon Valley no-hiring case
- FCC vote on incentive auction plan could further open broadband competition
- Google tech to bring 3D mapping smarts to NASA's space station robots
- Plastic computers taking shape, but won't replace silicon
- Apple has bigger plans than just song ID with Shazam deal
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Americans cool with lab-grown organs, but not designer babies
- IE6: Retired but not dead yet
- Twitter to promote app downloads in mobile timelines