- How to fix the two-factor authentication log-in error in Gmail on Android
- Tutorial: How to fix app store errors in Windows 8
- Brisbane to Gladstone yacht race fans track progress in real time
- How to fight back against CryptoLocker
Consider this: If you or an employee is using free Wi-Fi in some local café, in a matter of seconds a hacker can manipulate your machine into a "man-in-the-middle" scenario, where the device is now a conduit that sends data right to the bad guy. Once a device is compromised, login credentials (corporate mail server, bank accounts, LinkedIn.com, Facebook.com, etc.) can be harvested by using SSL Stripping.
By Michael Patterson, CEO, Plixer International | 27 November, 2013 16:12
People sign up for cruise ships to get away from it all. But not quite all: Passengers still want Wi-Fi access for the growing number of mobile devices they lug with them on vacation for staying in touch, web surfing, music, photos and video. Cruise line Royal Caribbean is turning to 802.11ac to optimize their Wi-Fi connectivity for this mobile data deluge.
By John Cox | 13 November, 2013 15:21
Georgia Tech researchers have developed a proof-of-concept attack called Jekyll that involves using Trojan Horse-style apps to sneak malware past Apple's app review process and onto iOS devices such as the iPhone and iPad.
By Bob Brown | 31 July, 2013 22:40
Underneath the mobile technology buzz at Mobile World Congress 2013 about expanding LTE deployments, and phasing in even faster LTE-Advanced networks later this year, is the strengthening market in operator-based Wi-Fi services.
By John Cox | 26 February, 2013 15:00
Using non-secured public Wi-Fi hotspots can leave you vulnerable to identity theft, data theft, snooping, impersonation and malware infection. That's why so many people rely on public virtual private network services, but VPNs are no panacea. Here are five potential gotchas.
By Sohail Ahmad, independent Wi-Fi consultant | 31 October, 2012 14:48
Learn how every business can improve efficiency, compete better, and deliver compelling user experiences with flash. You'll also gain access to Gartner's 2013 Cool Vendor Report Download our ebook and learn how you can: - Improve efficiency - Compete better - Deliver compelling user experiences
- FTMicrosoft Business Intelligence ConsultantNSW
- FTBrand Relationship Manager | RTB Trading Desk | Digital Advertising | SydneyNSW
- FTIT Support EngineerNSW
- FTOBIEE BI/DW ConsultantNSW
- FTMicrosoft Business Intelligence DeveloperNSW
- FTContent StrategistNSW
- FTDigital Content Manager/Senior Content Manager - CRM/Loyalty FocusNSW
- FTCampaign Managers | RTB | Display + Video | Trading desk |SydneyNSW
- FTDeliverability SpecialistNSW
Employees are one of your greatest risks to information security. We share five proven techniques to strengthen your security strategy and protect your business.
- Microsoft takes Iowa from corn to .com
- Google invites Glass wearers to brave LA's beaches
- Telerik frees HTML5 collection of components
- Space X rocket en route to ISS with space laser cargo
- AMD steers clear of low-cost tablet market
- Experts: Avoid big mistakes with Oracle's Exadata
- Steve Jobs' character becomes issue in Silicon Valley no-hiring case
- FCC vote on incentive auction plan could further open broadband competition
- Google tech to bring 3D mapping smarts to NASA's space station robots
- Plastic computers taking shape, but won't replace silicon
- Apple has bigger plans than just song ID with Shazam deal
- Satellite communication systems rife with security flaws, vulnerable to remote hacks
- Americans cool with lab-grown organs, but not designer babies
- IE6: Retired but not dead yet
- Twitter to promote app downloads in mobile timelines