Features

Review: Samsung Galaxy S III

Review: Samsung Galaxy S III

Samsung’s newest flagship Android smartphone.
Nic Healey Jun 8 2012 7:00AM Hardware
Cyber war puts civilians on the front line

Cyber war puts civilians on the front line

Defence should get off the civilian internet, Ranum says.
Marcus Ranum Jun 4 2012 12:10PM Security
Review: Fujitsu LifeBook SH771

Review: Fujitsu LifeBook SH771

A thin and light Ultrabook with a high price tag.
John Gillooly May 11 2012 5:00AM Hardware
Review: Samsung Galaxy Note

Review: Samsung Galaxy Note

Big and definitely beautiful.
Nic Healey Apr 27 2012 6:00AM Hardware
Review: Sony Xperia S

Review: Sony Xperia S

Sony's first smartphone without long-time partner Ericsson.
Nic Healey Apr 24 2012 7:00AM Hardware
Review: HTC One X

Review: HTC One X

A true powerhouse of a phone that puts competitors to shame.
Nic Healey Apr 17 2012 6:33AM Security
Review: Motorola Xoom 2

Review: Motorola Xoom 2

Good enough to keep the impending quad-core brigade at bay.
Nic Healey , David Bayon Apr 12 2012 7:00AM Hardware
Austar takeover ticked as News hacking heats up

Austar takeover ticked as News hacking heats up

Murdoch hints at legal action.
Martin Hirst Apr 2 2012 10:03AM Security
Review: Panasonic Toughbook

Review: Panasonic Toughbook

Not every laptop has to be wafer-thin.
John Gillooly Mar 30 2012 3:30PM Hardware
Review: Asus Eee Pad Transformer Prime

Review: Asus Eee Pad Transformer Prime

Best Android tablet yet, but no match for Apple's iPad.
Jonathan Bray Mar 20 2012 6:53AM Hardware
A new theory of digital identity

A new theory of digital identity

The final instalment of a two-part feature series explores the troubled practice of federated identity.
Stephen Wilson Mar 14 2012 6:49AM Security
Exclusive: How Sony is fighting back

Exclusive: How Sony is fighting back

Systems that monitor staff and user behaviour could detect social attacks.
Darren Pauli Mar 12 2012 11:26AM Security
Code surety: Secure by design

Code surety: Secure by design

Total security of applications is probably a pipe dream. However, starting a secure design framework today will markedly improve applications in the future, reports Deb Radcliff.
Deb Radcliff Mar 7 2012 5:34AM Security
Gary McKinnon: Butterfly on a wheel

Gary McKinnon: Butterfly on a wheel

A decade on, the saga continues.
Derek Parkinson Feb 27 2012 11:50AM Security
Review: HTC Velocity on Telstra 4G

Review: HTC Velocity on Telstra 4G

Australia's first 4G-ready smartphone on Australia's first 4G network.
Nic Healey Feb 22 2012 6:10AM Telco/ISP
CheckPoint 2012 predictions

CheckPoint 2012 predictions

External threats top the list.
Scott McKinnel Feb 7 2012 11:26AM Security
Social security risks

Social security risks

Bigger and bolder action needed to fight fraud over social networks.
Jim Romeo Feb 6 2012 4:09PM Security
Data breach priorities in the US

Data breach priorities in the US

If the breach is bad enough, US organisations must report it to authorities.
Ozzie Fonseca Jan 20 2012 7:54AM Security
Review: Samsung Galaxy Nexus

Review: Samsung Galaxy Nexus

It's the world's fastest smartphone, but is speed enough?
Jonathan Bray Jan 13 2012 6:00AM Hardware
Review: Acer S3 ultrabook

Review: Acer S3 ultrabook

Ultra-thin and light computing for a reasonable price.
John Gillooly Jan 11 2012 11:00AM Hardware

Log In

  |  Forgot your password?