With smartphones and sensors putting more demand on servers and other back-end gear, chip design company ARM is introducing new interconnect technologies that will help shuttle the data around more quickly.
By Agam Shah | 23 October, 2014 03:01
Apple has told browser users to pay attention to warnings of insecure digital certificates after reports of a "man-in-the-middle" attack against iCloud.com in China was revealed earlier in the week.
By Gregg Keizer | 23 October, 2014 02:55
As much as the Internet provides a place to connect, it's also a haven for trolls, bullies, cyberthieves and wackos. Recent incidents targeting women, including GamerGate and the iCloud nude photo leak, have brought some of the issues to the fore.
By Zach Miners | 23 October, 2014 00:47
EMC has confirmed it will purchase the bulk of Cisco's stake in VCE, the companies' joint venture in converged infrastructure products.
By Chris Kanaracus | 23 October, 2014 00:46
Amazon Web Services wants to become a more central part of enterprise IT with the AWS Directory Service, which both competes and integrates with Microsoft's Active Directory.
By Mikael Ricknäs | 23 October, 2014 00:45
A malicious Android app that takes over the screen of devices and extorts money from users with fake notifications from law enforcement agencies was recently updated with a component that allows it to spread via text message spam.
By Lucian Constantin | 22 October, 2014 23:16
If its bite-controlled iPhone app is any indication, gum maker Lotte wants music to be chewable.
By Tim Hornyak | 22 October, 2014 22:46
Just after Apple's iCloud service faced a hacking attack from China, Apple CEO Tim Cook met with a Chinese official on Wednesday to discuss protecting users' privacy.
By Michael Kan | 22 October, 2014 22:39
The digital domain will be an important focus for the new members of the European Union's executive branch, the European Commission, following their approval by the European Parliament on Wednesday.
By Loek Essers | 22 October, 2014 22:17
Targeted email attacks (called spear phishing) with harmful links or attachments containing malware are an ever-increasing threat. These attacks are part social networking and part sophisticated technical effort to penetrate companies' defense systems. Traditional security deployments, in many cases, aren't prepared for these kinds of attacks.
By J. Peter Bruzzese | 22 October, 2014 21:11
You may have seen Google Street View cameras mounted on a car mapping your neighborhood, but how about on a fishing boat?
By Tim Hornyak | 22 October, 2014 19:50
A court filing in May last year has attracted more class action lawsuits, alleging secret no-poaching deals among tech companies to keep salaries low.
By John Ribeiro | 22 October, 2014 17:38
Apple has warned users about attacks on its iCloud website, after monitoring groups alleged that China had tried to intercept customer information from the service.
By Michael Kan | 22 October, 2014 14:46
For the second time, Internet service provider iiNet has been dragged to court over the alleged copyright infringement of some of its customers.
By Rohan Pearce | 22 October, 2014 13:48
Benefits based on Forrester Consulting Study “The Total Economic Impact of Converging SAP Landscapes on Vblock™ Systems”
- FTCampaign Managers | Programmatic / RTB | Display + Video | Trading desk |SydneyNSW
- FTSEM Specialist - SEM AnalystNSW
- FTClient Service Director - Search: SEO & PPCNSW
- FTAccount Manager - DataNSW
- FTStrategic Account Manager - Google AnalyticsNSW
- FTData Product SpecialistNSW
- FTDigital Performance Manager - MediaNSW
- FTDigital Marketing CoordinatorNSW
Today’s security threats increasingly involve application-layer DDoS attacks mounted by organized groups of attackers to damage web-facing applications by exhausting resources. F5 BIG-IP ASM provides application-layer protection against DDoS attacks.
- Vietnam police hunt hackers behind mass outage
- Apple to stop SSL 3.0 support for push notifications soon
- Xiaomi moving data outside China following privacy concerns
- At Austin airport, Wi-Fi predicts how long the security line will be
- Twitter weaves Fabric, but will developers be drawn in?
- AT&T signed up 500,000 cars for its 4G network last quarter
- Debian community splits over systemd, but fork still unlikely
- TIO task force to field NBN grievances
- Government regulation on cloud security may spur SaaS use in health care
- Progress builds up developer chops with Telerik buy
- Monumental day for Wikipedia in Poland
- Microsoft misses Windows bug, hackers slip past patch
- IBM's chip business sale gets national security scrutiny
- IBM and Microsoft pledge to make their Clouds compatible
- Some Bank of America customers double-charged with Apple Pay