CFOtech UK - Technology news for CFOs & financial decision-makers

2degrees stories - Page 8

Story image
200,000 number 'ports' for 2degrees
Wed, 27th Jul 2011
#
uc
#
telco
#
2degrees
200,000 New Zealanders have ‘ported’ their number to 2degrees since its launch two years ago, the company says.
Story image
Vodafone customer base dips
Mon, 25th Jul 2011
#
uc
#
telco
#
2degrees
Vodafone NZ sees a sharp decline of 26,000 customers as market fresh-face 2degrees makes its mark, suggesting stiff competition ahead.
Story image
Spammers reducing reliance on Botnets
Thu, 14th Jul 2011
#
malware
#
phishing
#
email security
Report reveals spam at 3-year low as spammers swap botnets for malware and phishing, outsmarting traditional IP blocks.
Story image
2Degrees records loss
Mon, 27th Jun 2011
#
uc
#
telco
#
2degrees
2Degrees struggles with a £76.8m loss in its fight against Telecom and Vodafone giants, despite a revenue of £107.6m.
Story image
Google pushes web safety after inbox hacks
Fri, 3rd Jun 2011
#
phishing
#
email security
#
google
Internet giant pushes safety message after successful phishing attacks on military, government and political Gmail users.
Story image
2degrees worried about rural duopoly
Fri, 12th Nov 2010
#
uc
#
telco
#
broadband
Rural customers don't deserve a high speed version of the mobile duopoly New Zealanders have lived with for so long, says Chief Executive Eric Hertz.
Story image
Can 2degrees and XT top Vodafone’s gain?
Tue, 9th Feb 2010
#
uc
#
telco
#
2degrees
2degrees will release its customer numbers on Friday – two and half hours after Telecom reveals the number of subscribers on its XT Network.
Story image
The four challenges facing mobile data providers
Wed, 9th Dec 2009
#
uc
#
telco
#
2degrees
Telecom, Vodafone, and 2degrees face challenges as they upgrade networks and compete for faster data speeds, according to a report by Compuware.
Story image
Phishing example from ESET
Mon, 2nd Mar 2009
#
phishing
#
email security
#
risk & compliance
The scam is somewhat more elaborate than many we see, and it’s worth a little analysis to see what flags we can extract from it for spotting a phisher at work.