Kylie Minogue has supplanted her sister Dannii as the most dangerous Australian celebrity to search for information about online, a McAfee study shows.
Voice biometrics contact centre technology provides a way for banks and financial institutions to improve security and customer engagement.
Chinese networking vendor Huawei has accused the United States of taking "illegal action", after the release of a report claiming the NSA targeted the vendor for surveillance.
Cybersecurity breaches are keeping more IT leaders awake than ever before - but what if you could predict where and when they’ll occur? Almost every cybersecurity threat - including malware, DDoS and cyberespionage - is preceded by early warning signs that any IT manager can look out for.
Yahoo! gave the Australian government data on at least 305 of its users in the first half of 2013.
The Coalition government has released and almost immediately denied a policy requiring filters to be installed by default on mobile phones and modems sold in Australia.
About every five years, attackers launch new types of threats - and a new wave is upon us. These steps can help to avoid being compromised by this new wave.
Microsoft and Google will move ahead with litigation against the US government, in order to gain permission to disclose greater detail about the customer information they are compelled to reveal to US agencies under the US's Foreign Intelligence Surveillance Act (FISA).
It's commonly said in IT that security is the antithesis of innovation. Innovation creates disruption, and disruption introduces vulnerability. But is that really the case?
Facebook granted Australian authorities access to data on at least 384 of the social network's users in the first half of 2013.
Demand for DDoS protection technology is booming in APAC, but doubts about the value of such solutions still linger in Australia and other markets.
Google's Cloud Messaging Service, used to let Android app developers interface with their programs, is attracting the attention of malware authors.
The group that infiltrated New York Times networks over a four-month period last year appear to have launched new campaigns using upgraded versions of targeted attack malware.
ICT groups opposed to NZ’s proposed new interception amendments fear the rules could reduce the competitiveness of domestic companies and force international players out of the market.
Computers from Chinese company Lenovo have been banned from “classified” networks of the intelligence and defence services of Australia, the United States, Britain, Canada and New Zealand due to concerns that the machines could easily be hacked.