From virtual bank heists to semi-open attacks from nation-states, this year has been rough on IT security. Here are some of the major cyber attacks of 2017 and what we can learn from them.
Stories by Josh Fruhlinger
Scams on social networks are nothing new, but they're constantly changing to take advantage of the latest apps, trends and news. As with all social engineering scams, the best defense is a skeptical user.
The debate over fake news is roiling the political world, but elements of it look very familiar to tech veterans—and represent a potentially new attack vector that IT needs to worry about.
If it ain't broke, don't fix it. If it breaks, buy a replacement part on eBay and stubbornly refuse to upgrade.
Whether you want to lower your cell phone bill or find true love, there's usually a way around your problems
Execs at AOL and Verizon hope their merger will be a story for the ages, not a cautionary tale.
In Pictures: Tech's ticking time bombs - The components you might (and might not) expect to wear out
Your computer's next point of failure might be further up the stack than you think
With big layoffs rumored to be close on the horizon, IBM is going to need to use another regeneration.
You have two options when it comes to beating the automated systems that filter resumes: you can go through them, or you can go around them.
You're definitely going to meet them. Hopefull you aren't one of them.
Proof that no matter how much time, effort, and money you put into something, it may sink like a stone and stay at the bottom
Some buzzwords evolve from the foam of language; others are invented in strokes of evil genius
These scorned IT staffers had their vengeance on their former employers -- but most got their comeuppance in the end.
If you don't like their answer, wait a while, maybe it'll change.
You might think you're familiar with the steady march of automation. But the list of jobs that are being disrupted by technological change may surprise you.
- CCAgile Project ManagerNSW
- CCPrincipal Project Manager - ieMR ImplementationQLD
- CCSenior Business Analyst - RFTVIC
- FTTechnical Quality Analyst (Payments, data, application integration)VIC
- FTSenior Security EngineerOther
- FTBusiness Intelligence DeveloperNSW
- FTCyber Security AnalystOther
- FTSenior Healthcare Pre-Sales Exec. / Clinical Advisor - Perm - North Ryde areaNSW
- CCHR Coordinator - TelcoVIC
- CCiOS DeveloperQLD
- FTProject Manager/Business Analyst (Hybrid role)SA
- CCSCCM Application PackagerQLD
- CCOffice Administrator - TelcoVIC
- CCITSM AnalystVIC
- CCDigital DesignerNSW
- CCKnowledge Analyst (Digital Content)NSW
- CCX2 BPE Managers - TelcoVIC
- CCSenior Business Analyst - Supply Chain / LogisiticsVIC
- CCIteration Manager/Scrum MasterWA
- CCJava DeveloperNSW
- CCChange ManagerQLD
- FTIT Forensics and Fraud Technical LeadOther
- CCProject Manager (mid-level)NSW
- CCSenior Infrastructure Project ManagerNSW
- CCSenior ERP Project Manager QLD