Features

Review: Motorola Xoom 2

Review: Motorola Xoom 2

Good enough to keep the impending quad-core brigade at bay.
Nic Healey , David Bayon Apr 12 2012 7:00AM Hardware
Austar takeover ticked as News hacking heats up

Austar takeover ticked as News hacking heats up

Murdoch hints at legal action.
Martin Hirst Apr 2 2012 10:03AM Security
Review: Panasonic Toughbook

Review: Panasonic Toughbook

Not every laptop has to be wafer-thin.
John Gillooly Mar 30 2012 3:30PM Hardware
Review: Asus Eee Pad Transformer Prime

Review: Asus Eee Pad Transformer Prime

Best Android tablet yet, but no match for Apple's iPad.
Jonathan Bray Mar 20 2012 6:53AM Hardware
A new theory of digital identity

A new theory of digital identity

The final instalment of a two-part feature series explores the troubled practice of federated identity.
Stephen Wilson Mar 14 2012 6:49AM Security
Exclusive: How Sony is fighting back

Exclusive: How Sony is fighting back

Systems that monitor staff and user behaviour could detect social attacks.
Darren Pauli Mar 12 2012 11:26AM Security
Code surety: Secure by design

Code surety: Secure by design

Total security of applications is probably a pipe dream. However, starting a secure design framework today will markedly improve applications in the future, reports Deb Radcliff.
Deb Radcliff Mar 7 2012 5:34AM Security
Gary McKinnon: Butterfly on a wheel

Gary McKinnon: Butterfly on a wheel

A decade on, the saga continues.
Derek Parkinson Feb 27 2012 11:50AM Security
Review: HTC Velocity on Telstra 4G

Review: HTC Velocity on Telstra 4G

Australia's first 4G-ready smartphone on Australia's first 4G network.
Nic Healey Feb 22 2012 6:10AM Telco/ISP
CheckPoint 2012 predictions

CheckPoint 2012 predictions

External threats top the list.
Scott McKinnel Feb 7 2012 11:26AM Security
Social security risks

Social security risks

Bigger and bolder action needed to fight fraud over social networks.
Jim Romeo Feb 6 2012 4:09PM Security
Data breach priorities in the US

Data breach priorities in the US

If the breach is bad enough, US organisations must report it to authorities.
Ozzie Fonseca Jan 20 2012 7:54AM Security
Review: Samsung Galaxy Nexus

Review: Samsung Galaxy Nexus

It's the world's fastest smartphone, but is speed enough?
Jonathan Bray Jan 13 2012 6:00AM Hardware
Review: Acer S3 ultrabook

Review: Acer S3 ultrabook

Ultra-thin and light computing for a reasonable price.
John Gillooly Jan 11 2012 11:00AM Hardware
Review: ActivIdentity 4TRESS Authentication Appliance FT2011

Review: ActivIdentity 4TRESS Authentication Appliance FT2011

Multitenant, fraud detection support but it is pricey and a bit hard to use.
Peter Stephenson Jan 10 2012 4:51PM Security
Review: Deepnet Security DualShield v5.2

Review: Deepnet Security DualShield v5.2

Biometric token support that is easy to deploy and use, but support is a bit pricey.
Peter Stephenson Jan 10 2012 4:34PM Security
Defensive approaches for APTs

Defensive approaches for APTs

Study logs, whitelist, use multi-factor authentication and educate users.
Stephen Lawton Jan 10 2012 4:29PM Security
The new wave of teaching infosec

The new wave of teaching infosec

Cyber security can be a sport.
Dan Kaplan Jan 10 2012 3:54PM Security
Review: Cryptocard Blackshield Server v3.1

Review: Cryptocard Blackshield Server v3.1

Set up and deployed easily and alerting was well done.
Peter Stephenson Jan 10 2012 12:30AM Security
The importance of incident response downtime

The importance of incident response downtime

Responders need time to think, read and document.
Kevin Liston Dec 21 2011 7:23AM Security

Log In

  |  Forgot your password?