Recommends The best 5G phones 5G is now standard on US networks, and these are the top phones that support it. Read now Google has released its side of the fix for a weird bug that prevented some Android phones from mak...
James Watkins Cisco and Amazon are teaming up with Lockheed Martin to learn how astronauts in space could use collaboration and communication tools like Webex and Alexa. The three companies plan to deploy Callisto, a t...
It's fitting that just a day after Apple celebrated reaching a$3 trillion market capitalization for the first time in US history, BlackBerry is turning off the lights on the last few smartphone holdouts. No, Apple's iPhone...
Researchers have warned that the Purple Fox rootkit is now being distributed through malicious, fake Telegram installers online. Recommends Best VPN services Best security keys Best antivirus software The fastest VPNs ...
Use Google Chrome? You're not alone. But if you're like most users of this browser, you probably feel that Chrome isn't the best when it comes to speed or handling system resources. COVID-19 Testing The best at-home rapid...
Somalytics products on show at CES 2022: SomaControl (left) and SomaSense (right). Images: Somalytics Somalytics, a startup launched in November 2021 to commercialise technology developed by researchers at the Univers...
Drone delivery is still in the starting gate, but with early testbeds showing positive results there's good reason to suspect regulators will become more permissive in the mid term. But should delivery include controlled s...
Morgan Stanley has agreed to a settlement figure of$60 million to resolve a data breach lawsuit. Security 8 habits of highly secure remote workers How to find and remove spyware from your phone The best VPN services: Ho...
China has released draft laws that will require, amongst others, mobile apps to be licensed if they provide news and go through a security assessment if they can influence public opinion. They also must adhere to cybersecurity gui...
The Malsmoke hacking group is now abusing a vulnerability in Microsoft's e-signature verification tool to deploy malware and steal user data. Security 8 habits of highly secure remote workers How to find and remove spyware fro...
It is not news that healthcare organizations are in the crosshairs of cyberattackers looking to steal valuable personal information. Geographically dispersed healthcare organizations also face a particularly complex set of challen...
Image: Cameron Spencer/Getty Images During Australia's federal Budget Estimates last year, Services Australia was grilled by senators about various initiatives under its remit, from the COVID-19 digital certificate rol...