TurboBackup users have been using it for backing up work, synchronizing between Laptop, Netbook, or Desktop PCs, scheduling unattended...
Showing results 1 to 20 of 138
Home Depot said it has added better encryption software and replaced 85,000 PIN pads following the attack that started in April.
"SynoLocker" malware infects through a vulnerability in older versions of their NAS software. The attack demands 0.6 BitCoins (about $350) to decrypt files.
The Chinese state media attack on US software and hardware continues, with China’s CCTV state network broadcasting a critical report suggesting that Windows 8 is being used to harvest data about the country’s citizens for use by the US government.
Researchers have demonstrated methods to bypass EMET, suggesting that cybercriminals can do the same.
The company has issued a warning that a malicious email campaign is underway using Adobe software licenses as a lure. Adobe calls it a phishing attack, but other reports say it contains a malware attachment.
Fireebok Data Recovery is a useful utility to recover lost data from your Mac computer. With this advanced data recovery software,...
An Indian malware service is building attack software for projects involving secret surveillance.
After a sophisticated attack hit Twitter's users on the weekend, the micro-blogging platform is looking to hire a software engineer to help implement two-factor authentication.
Lazesoft Data Recovery Just a few clicks, you can use it to recover deleted files and recover data from formatted, damaged or lost...
Most modern Macs have Java installed, so they could be vulnerable to the Flashback. While Apple posted a security fix for Mac OS X Lion and Mac OS X Snow Leopard, there are many millions of Macs running older software. Still there's an easy way to prevent a Java drive-by attack, besides pulling the plug.
Traditional enterprise has come under fire from both disillusioned users and unhappy managers.
Software "PoisonIvy" stole information from computers operated by these companies, which were not named, in attack that appears to be industrial espionage, reveals new report from security firm Symantec.
The open-source Apache Software Foundation warns that active use of a 'killapache' attack tool targeting an unpatched vulnerability has been observed.
Malware authors will do just about anything to fool you into installing their software. A popular target is search engine advertising, which one gang is using on Microsoft's search results. In a separate attack, Mac users are being targeted by a Trojan that mimics a Flash installer.
The Australian firm saw its Software-as-a-Service platform taken offline by a denial-of-service attack on its hosting provider
A distributed denial-of-service (DDoS) attack against Atlassian's hosting provider took the company's Software-as-a-Service (SaaS) platform down for a few hours this morning, with services returning this afternoon.
After a month-long Mac Defender/Mac Guard malware attack, Apple has finally released the security update it promised last week. The update takes one more step on the road to turning an obscure security feature into something very close to full-fledged antivirus software, complete with daily checks for new definitions.
Security researchers from WebSense have detected a mass SQL injection attack, which the cybercriminals monetize through scareware, also known as fake security software.
Microsoft has a long-established practice of disarming competition by not acknowledging it, because acknowledging the competition gives it power. Well, the Redmond giant has changed stance when it comes to OpenOffice and launched a video attack on the free alternative to the Office software suite.
The company's security team has reset its 'rules of engagement' for disclosing bugs to software makers, a month after a member was rapped by Microsoft for publishing an XP flaw
The Department of Parliamentary Services has undertaken action to prevent distributed denial-of-service (DDoS) attacks on government sites, such as those conducted by international group "Anonymous" in February.
A bypassing technique can fool commonly-used antivirus programs into allowing the execution of malicious code, according to a security research firm
The best of ZDNet, delivered
- 1 33 ways to improve your iPhone's battery life
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 So you have an app idea and want to make a bajillion bucks