A critical vulnerability found recently in a popular newsletter plug-in for WordPress is actively being targeted by hackers and was used to compromise an estimated 50,000 sites so far.
By Lucian Constantin | 25 July, 2014 02:06
While the job market is healthy for IT pros, certain talents are more valuable than others, and it's wise to keep adding to your skills arsenal.
By Ann Bednarz | 25 July, 2014 02:01
A new survey of IT security professionals shows that many businesses are barely starting to exploit mobile technology, and some of them may be a mobile security nightmare waiting to happen.
By John Cox | 25 July, 2014 01:47
A full and healthy ecosystem of products and services built around wearable technology will require major efforts to ensure interoperability, according to Qualcomm senior vice president of interactive platforms Rob Chandhok.
By Jon Gold | 25 July, 2014 01:47
Google, Microsoft and Yahoo are meeting with European data protection authorities Thursday to discuss how to implement a recent ruling that gives people the right to have personal information excluded from search results.
By Loek Essers | 25 July, 2014 01:46
Fitbits and smart watches and Google Glass are all well and good, but the most meaningful early use of wearable technology will happen in industrial and enterprise settings, according to experts on a Wednesday panel discussion at the Wearable Tech Expo in New York.
By Jon Gold | 24 July, 2014 23:45
Many European consumers are frustrated by frequently being denied access to online services outside of their home countries and are calling on the European Commission to implement a 'common copyright' in Europe. This pits them against publishers and broadcasters, who want enforcement of existing rules instead, a public consultation on EU digital copyright reform showed.
By Loek Essers | 24 July, 2014 23:35
Hackers have stolen user contact information, including email addresses and phone numbers, from the website of the European Central Bank and attempted to extort money from the institution.
By Lucian Constantin | 24 July, 2014 22:38
Lenovo showed off a smart glasses prototype on Thursday, part of a push to attract developers and other hardware manufacturers to a new partner program.
By Michael Kan | 24 July, 2014 22:11
Salesforce.com is combining its Pardot marketing software, sales automation application and social communities platform into a new product called Sales Reach, which it says can help salespeople nurture leads and make deals in real time.
By Chris Kanaracus | 24 July, 2014 22:01
The G3 has boosted LG's smartphone shipments to record levels and helped reverse three quarters of losses at its phone division, the electronics giant said Thursday.
By Tim Hornyak | 24 July, 2014 12:14
EBay faces a class action suit in a U.S. federal court over a security breach earlier this year.
By John Ribeiro | 24 July, 2014 16:58
Communications minister Malcolm Turnbull and finance minister Mathias Cormann have warned the Australian Competition and Consumer Commission that cutting wholesale pricing for services over Telstra's copper network could negatively affect the National Broadband Network rollout.
By Rohan Pearce | 24 July, 2014 14:04
The sale of the domain Bitcoins.com, affiliated with Mt. Gox CEO Mark Karpeles, has been halted after a U.S. court order, according to the auction house.
By Tim Hornyak | 24 July, 2014 13:05
China's anti-monopoly investigation of Qualcomm is starting to disrupt its licensing business and making it harder for the U.S. company to collect royalties from the country.
By Michael Kan | 24 July, 2014 12:55
If you’re looking for your first ERP system or looking to upgrade from an existing system, the evaluation, selection and implementation process is a long-term strategic decision for your organization. To help you through this process, here are eight simple steps for a successful ERP system selection.
A DDoS attack can be a stressful engagement where parts of the network will be unresponsive and equipment may be failing all around. That is not the time to be planning a defense—preparing your network applications during “peacetime” will go a long way to helping you mitigate the attack in the future.
- Queensland Ambulance Service invites offers for iOS report form
- ABS develops Web service for users to create own population clock
- Rogue employees using photocopiers and email services to steal data
- Connected home brings new revenue opportunity for telcos: Ovum
- Melbourne recruitment firm fined $11k for Office 2007 piracy
- Blow up your website and start over
- Until the Tails privacy tool is patched, here's how to stay safe
- Telstra unveils interoperable videoconferencing service
- Apple will 'set the world on fire' with iPhone 6 sales
- LTE network for US public safety taking it one step at a time
- A new tool for disasters: The personal antenna
- Phone unlocking bill clears US House, next step is president's signature
- Apple hasn't exhausted its supply of Yosemite betas
- Oracle's new in-memory database option could spark unanticipated costs, expert warns
- Bose sues Beats over headphone patents