SMS-based two-factor authentication is rapidly becoming the "go-to" identification method for maintaining privacy, sensitive or high-value transactions.
As the world becomes increasingly connected through a growing array of Internet savvy devices, Victoria Ivey takes a look at five types of software made better by making the move online.
The child’s parents have called for the culprits to be made an example of and local councillors have also come out to criticise those that hacked into the page.
Vodafone has joined the Z2 pre-order club, and the network is offering a free 32in Sony TV, but only to the first 3,000 customers.
4 out of 5 solutions billed as protecting against distributed denial of service attacks are actually just snake oil, according to a new study. So how do you pick a solution you can trust?
We’ve got some advice on how best to stay safe when you’re travelling, from your choice of hotel through to words of warning about Wi-Fi hotspots.
Former National Security Agency contractor Edward Snowden said he repeatedly tried to go through official channels to raise concerns about government snooping programs, but was repeatedly ignored.
Once a hacker gains access to a privileged account, they can leapfrog from system to system, causing chaos and stealing data at will. We count down the top 8 ways these accounts get compromised
Version 9.0 of SAP Business One for SAP HANA has been revealed, a flexible and scalable big data analysis solution for small to midsize enterprises.
The Internet can be pretty inflexible and difficult to control, but a new buzzword, software defined networking (SDN), is full of possibilities. Here's all you need to know.