- Tutorial: How to fix app store errors in Windows 8
- How to fix the two-factor authentication log-in error in Gmail on Android
- 10 open source e-learning projects to watch
- Connected vehicle tech trial to start trucking on in NSW
privacy in pictures
So Australians probably don't need to worry about getting their kneecaps broken if they don't hand over their private encryption keys just yet, but the Australian Crime Commission wants changes to the law in order to make it easier for law enforcement to decrypt secret communications.
By Rohan Pearce | 23 April, 2014 10:59
Appearing today before a Senate inquiry, law enforcement agencies have confirmed that there is no legal obligation on them to destroy so called 'metadata' gathered from warrantless surveillance.
By Rohan Pearce | 22 April, 2014 14:31
The Tor Project has flagged 380 Tor relays vulnerable to the critical Heartbleed flaw to be rejected from the Tor anonymity network, reducing the network's entry and exit capacity.
By Lucian Constantin | 18 April, 2014 03:15
Canadian police have arrested a 19-year-old man for allegedly using the Heartbleed bug to steal data about taxpayers.
By Stephen Lawson | 17 April, 2014 09:31
A security researcher today provided a way for users to see whether their e-mail addresses and passwords were among the 1.3 million compromised in a hack of Gawker Media's sites.
By Gregg Keizer | 14 December, 2010 06:54
In 2003, author and security pioneer Simson Garfinkel conducted a study of data he found on second-hand hard drives. On eBay, Garfinkel bought the hard drive from an old ATM machine; it held 827 bank account PINs. Another drive he purchased on eBay had previously been owned by a medical center and contained information on 31,000 credit card numbers.
By Tony Bradley | 05 May, 2010 23:35
The U.S. commercial drone industry is still struggling to get off the ground more than two years after President Obama signed into law a bill that permits the civilian use of unmanned aerial vehicles (UAV) over the country's airspace.
By Jaikumar Vijayan | 18 April, 2014 21:36
As tech companies increasingly rely on analyzing and selling user data to boost revenue, trust is emerging as one of the defining issues of the year for the IT sector.
By Marc Ferranti | 06 March, 2014 22:06
A report Thursday by the Privacy and Civil Liberties Oversight Board calling the NSA's bulk phone records collection program illegal and mostly useless puts the Obama Administration in an awkward spot.
By Jaikumar Vijayan | 23 January, 2014 19:45
Retailers and banks must move quickly to figure out who should be responsible for better securing the payments system network or risk having Congress decide for them.
By Jaikumar Vijayan | 23 January, 2014 16:05
Whitepapers about privacy
Cloud computing has fundamentally changed the way businesses and consumers use computers and technology and the way Information Technology (IT) professionals manage those resources. While the cloud has delivered a multitude of benefits to technical and non-technical people alike, there have also been significant downsides to reliance on cloud technology, including unplanned outages and even outright cyberattacks and data theft.
Learn how every business can improve efficiency, compete better, and deliver compelling user experiences with flash. You'll also gain access to Gartner's 2013 Cool Vendor Report Download our ebook and learn how you can: - Improve efficiency - Compete better - Deliver compelling user experiences
- FTDigital Account Manager X 3 | Display + Video advertisingNSW
- FTMicrosoft Business Intelligence ConsultantNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTContent StrategistNSW
- FTDigital Content Manager/Senior Content Manager - CRM/Loyalty FocusNSW
- FTDeliverability SpecialistNSW
Distributed denial of service attacks (DDoS) attempt to make a machine or network resource unavailable to its intended users, with a wave of crippling attacks on enterprises since 2012. This whitepaper offers guidance to security and network architects in designing, deploying, and managing architecture to protect against increasingly sophisticated, application-layer DDoS attacks.
- Russian SMS Trojan for Android hits US, dozens of other countries
- Enterprise and service provider networking port revenues reach $39B
- FCC adds $9 billion to broadband subsidy fund
- Microsoft's Bing goes ad-free for all U.S. schools
- Android mobile ad traffic beats iOS for first time
- Samsung's Galaxy Tab 4 line-up goes on sale May 1 starting at $199.99
- Apple kicks off public OS X beta testing
- It's the little things that matter in Amazon Redshift upgrade
- Google AdWords cleared in geotagging patent lawsuit
- China's Xiaomi targets ten markets in international expansion
- Toshiba, SanDisk NAND flash memory shrinks to 15-nanometer process
- Bing for schools out of pilot stage, promises ad-free search
- NSA spying revelations have tired out China's Huawei
- Brazil's senate passes Internet legislation ahead of NETmundial conference
- US to vote on sharp increase in broadband subsidies