hot

Photos: NextDC unveils flagship Melbourne data centre

Photos: NextDC unveils flagship Melbourne data centre

Launches remote access app.
Jul 5 2012 7:31AM
1000 days left for Windows XP support

1000 days left for Windows XP support

Windows XP nears 50 percent market share
Jul 13 2011 5:54AM
Top 10 hot topics at RSA 2010

Top 10 hot topics at RSA 2010

Talking points of last week's conference.
Mar 8 2010 2:36PM
Hot or not: ActiveX vulnerabilities

Hot or not: ActiveX vulnerabilities

ActiveX vulnerabilities have posed a security challenge for some time, and they're likely to be a challenge for quite some time to come.
Sep 18 2009 12:37PM
Photos: Inside Datapod's container data centres

Photos: Inside Datapod's container data centres

Canberra company builds a data centre in a box.
Aug 18 2009 11:56AM
Hot or not: Software update vulnerabilities

Hot or not: Software update vulnerabilities

The automatic update features in many software applications are proving to be vulnerable to attack. Hackers are taking notice. You should, too.
Nov 20 2008 1:56PM
Feature: hot tips for virtualisation

Feature: hot tips for virtualisation

Migrating systems to a virtualised environment can deliver significant efficiency gains and cost savings, but it has to be planned carefully. Martin Courtney explains how IT leaders can improve the odds of success.
Oct 13 2008 3:12PM
Hot or Not: Virtualisation Security

Hot or Not: Virtualisation Security

What are the potential security implications of virtualisation? The answer is: they are considerable.
Apr 8 2008 3:21AM
Hot or Not: Vista SP1 Scheduled For Widespread Release

Hot or Not: Vista SP1 Scheduled For Widespread Release

It's been some time in the making, but Microsoft soon will make its first service pack for Vista widely available. While the final version started shipping to manufacturers earlier this month, Microsoft says it's making some final tweaks to its distribution channels before general availability in a few weeks. So what can we expect?
Mar 12 2008 3:48PM
Telstra in hot water with ACCC, again

Telstra in hot water with ACCC, again

Despite its glowing financial status, Telstra has become embroiled in three separate Line Sharing Service (LSS) disputes.
Feb 22 2008 3:40PM
Egg in hot water over cancelled credit cards

Egg in hot water over cancelled credit cards

Online bank Egg is facing a storm of criticism and a possible Financial Services Authority investigation after cutting off 161,000 of its credit card users.

Feb 5 2008 3:33PM
Hot or not: The Forum of Incident Response and Security Teams (FIRST) unveils updated common vulnerability scoring system

Hot or not: The Forum of Incident Response and Security Teams (FIRST) unveils updated common vulnerability scoring system

The new scoring system promises to make it easier for security managers and the IT industry to better measure the real-world risks associated with software flaws.
Sep 11 2007 3:03PM
Black Hat attendees pick mobile threats as the next hot security topic

Black Hat attendees pick mobile threats as the next hot security topic

Mobile threats were considered the next major security issue by IT professionals who attended the Black Hat conference in Las Vegas last week, according to a survey released today by Symantec.
Aug 6 2007 9:59AM
Hot or not: Local buffer overflow vulnerabilities

Hot or not: Local buffer overflow vulnerabilities

Buffer overflows have long been a primary vector of attack against computer systems — and the rise of local buffer overflow vulnerabilities and zero-day attacks makes it a problem that's likely to grow more troublesome.
May 29 2007 9:58AM
Hot or not: Software as a service

Hot or not: Software as a service

SaaS is no longer just about CRM — more security vendors are revamping their applications to be delivered as services over the web.
May 7 2007 2:57PM
Consumers hot for iPhone

Consumers hot for iPhone

Study says consumers want Apple mobile, but not right away.
Apr 20 2007 10:36AM
Hot or Not: Local privilege escalation vulnerabilities

Hot or Not: Local privilege escalation vulnerabilities

Due to the interactive nature and required access to exploit, local privilege escalation vulnerabilities have traditionally been thought to have a minimal impact on the strategies enterprise IT departments incorporate to protect networks when compared to other code execution vulnerabilities.
Apr 12 2007 4:31PM
Hot or not: Reverse code engineering

Hot or not: Reverse code engineering

Hot: It's one of the primary methods that malicious hackers use to find new application and operating system vulnerabilities.
Mar 26 2007 8:03AM
Hot or not: Third-party patches

Hot or not: Third-party patches

Last month's race between a group of security researchers who promised to disclose, every day, a newfound vulnerability in the Apple OS X platform, and an opposing group, led by a former Apple employee, to independently plug those security flaws, has sparked new debate around the validity of third-party security patches.
Feb 19 2007 8:00AM
Hot or Not: Remote access breaches

Hot or Not: Remote access breaches

Just like the detectives do on weekly television crime dramas, put yourself in the mind of the bad guy. Pretend that you're the criminal who brokers stolen personal information with organised crime syndicates overseas. Put yourself behind the eyes of the malicious hacker who plans to breach merchant networks and compromise wholesale volumes of consumer payment card information, the kind of information that can be bartered within the internet's dark underbelly.
Jan 24 2007 9:11PM

Log In

Username / Email:
Password:
  |  Forgot your password?