hotspot - News, Features, and Slideshows
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft, data theft, snooping, impersonation and malware infection. That's why so many people rely on public virtual private network services, but VPNs are no panacea. Here are five potential gotchas.
By Sohail Ahmad, independent Wi-Fi consultant | 31 October, 2012 14:48
In 2008, the number of commercial aircraft that offered in-flight Wi-Fi service totaled just 25, according to market researcher In-Stat. By the end of 2010, however, In-Stat predicts that number should reach 2,000 planes.
By Thomas Wailgum | 19 October, 2010 04:55
There's been an explosion in growth of Wi-Fi hotspots during the last several years. Best-guess estimates range from 33,000 WLAN hotspots worldwide to more than 250,000 at present.
By Thomas Wailgum | 21 August, 2008 11:54
Research shows that 94% of CIOs believe that enterprise mobility has become an important part of their enterprise IT strategy. While there are many benefits for business, there are still risks when it comes to security. This whitepaper looks at the steps all organisations to take when it comes to supporting a mobile workforce.
- FTManual Test Engineer | Financial Institution | Web testingNSW
- CCMilitary simulation programmer with C# and Unity - 3 monthsNSW
- FTField EngineerNSW
- FTSystems Administrator | National commercial law firm | MS, AWS & eDiscoveryNSW
- FTLevel 2 IT Support TechnicianVIC
- CCE-Commerce - Senior Web Application DeveloperNSW
- FTAndroid DeveloperNSW
- FTSystems Administrator - Managed ServicesNSW
- FTSenior Consultant | Project work | National Systems IntegratorVIC
- FTLinux Administrator with AWS & DevopsNSW
- FTMid level IT consultant | Systems Integration & Managed ServicesNSW
- FT1st & 2nd level IT support all-rounder in beautiful rural BathurstNSW
Data has been growing faster than the ability to manage it. As a result, organisations cannot say for sure how much information they have, where it is or what secrets and risks it contains – it is effectively ‘dark data’. This whitepaper looks at how to address the situation with a new 4-stage approach by using technology tools and processes to enable information managers to search and govern all their unstructured data consistently and repeatedly.
- Meet Project Orca, SAP's new, Hana-based analytics tool
- Machines are replacing writers, Gartner says
- Can Microsoft's new phones save its mobile ambitions?
- Digital Guardian buys Code Green to gain data-loss prevention tech
- Microsoft charges into laptop market with Surface Book
- Cisco disrupts $60M ransomware biz
- Windows 10 device roundup features Lumia smartphones with Display Dock
- No need to panic: European Commission upbeat about Safe Harbour ruling
- When it comes to security, trust but verify
- Researchers steal secret RSA encryption keys in Amazon’s cloud
- Apple's new strategy for fighting off Android, retaining customers
- Atlassian takes JIRA beyond the development world
- Arista adds security to cloud software
- Windows 10 users back away from the Edge
- Doom or delight? Court ruling on Safe Harbor brings uncertainty to privacy dealings