- How to fix the two-factor authentication log-in error in Gmail on Android
- Tutorial: How to fix app store errors in Windows 8
- 10 open source e-learning projects to watch
- Connected vehicle tech trial to start trucking on in NSW
hackers in pictures
From online bank heists to Chinese hackers, 2013 is adding up to be a security mess
By Michael Cooney | 02 July, 2013 11:12
Miss Despoinas – Hobart's critical-engineering-space-cum-virtual-hack-space – is preparing to host a satellite event as part of the 19th International Symposium on Electronic Art.
By Rohan Pearce | 02 May, 2013 13:22
Hackers are brazenly infiltrating corporate networks to steal valuable data for purposes of sharing it with other companies or nation-states -- and they're getting away with it, say security researchers sharing war stories at the Hacker Halted conference in Miami this week.
By Ellen Messmer | 30 October, 2012 18:35
The University of Melbourne has reported an unexpected side benefit from deploying network security — saving money.
By Hamish Barwick | 29 October, 2012 16:11
Well, that was fast. Do-it-yourself electronics kit maker and hobby retailer Adafruit recently announced that a hacker had won the company's Open Kinect Bounty. Spain-based hacker Hector Martin Cantero, who is known online as "marcan," released a proof-of-concept video Wednesday night showing the Kinect interfacing with his Linux-based laptop.
By Ian Paul | 13 November, 2010 02:06
Technology drives just about everything we do, and not just at our jobs. From banks to hospitals to the systems that keep the juice flowing to our homes, we are almost entirely dependent on tech. More and more of these systems are interconnected, and many of them are vulnerable. We see it almost every day.
By Dan Tynan | 16 March, 2010 04:01
Whitepapers about hackers
Given the advances attackers have been making, it is very unlikely that organizations will be able to keep motivated and patient adversaries out of their networks. In most cases, the best one can hope for is to detect targeted attacks early and limit the amount of information the attackers can obtain access to. In this whitepaper, we identify the timeline of a typical attack sequence and the tools available for implementing custom defence strategies.
Learn how every business can improve efficiency, compete better, and deliver compelling user experiences with flash. You'll also gain access to Gartner's 2013 Cool Vendor Report Download our ebook and learn how you can: - Improve efficiency - Compete better - Deliver compelling user experiences
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTDigital Content Manager/Senior Content Manager - CRM/Loyalty FocusNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTContent StrategistNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTDeliverability SpecialistNSW
Developed by the CIO executive Council in conjunction with Rob Livingstone Advisory, Pathways Advanced is a 12-month CIO delivered, small group, mentor based professional leadership development program. Pathways Advanced brings together best practice, thought leadership and business insights for today’s most promising ICT professionals
- Samsung's Galaxy Tab 4 line-up goes on sale May 1 starting at $199.99
- Apple kicks off public OS X beta testing
- It's the little things that matter in Amazon Redshift upgrade
- Google AdWords cleared in geotagging patent lawsuit
- China's Xiaomi targets ten markets in international expansion
- Toshiba, SanDisk NAND flash memory shrinks to 15-nanometer process
- Bing for schools out of pilot stage, promises ad-free search
- NSA spying revelations have tired out China's Huawei
- Brazil's senate passes Internet legislation ahead of NETmundial conference
- US to vote on sharp increase in broadband subsidies
- Coding error protects some Android apps from Heartbleed
- Optus Satellite extends NZ market reach with Wireless Nation deal
- Dorian Nakamoto thanks Bitcoin users for donations
- While Heartbleed distracts, hackers hit US universities
- Should Australians prepare for rubber-hose cryptanalysis?