EZView, a mobile video surveillance app, allows you to view live surveillance videos, play back recordings, and receive alarm notifications...
Showing results 1 to 20 of 28,907
A security researcher joked about hacking a plane and was picked up by the FBI. They didn't think it was one bit funny.
Leading security experts say they can already share cybersecurity information without compromising privacy law.
Twitter's general counsel said in a Washington Post editorial: "Open discussion doesn't mean much if some people are afraid to take part."
Zero Day Weekly: Active Microsoft zero-day, Oracle kills Java, D-Link snafu, more DHS cyber-negligence
A collection of notable security news items for the week ending April 17, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Google has firmed up its support deadline for Chrome on Windows XP with the last security update set for the end of the year.
IBIZA / FORMENTERA THE COMPLETE GUIDEAn exclusively extensive, multilingual, free app bursting with comprehensive listings of over...
Another annual dollop of delicious data shows that despite all the trendy new twists and exotic malware threats, we're still getting the security basics wrong.
Australia's Tier-3 is launching its Huntsman Security operation in the United States, backed by a $10 million investment injection from the Sydney-based IT security company.
This bi-monthly magazine provides first-hand reports, analyses, assessments, evaluations, and briefings of what is going around in...
In emails leaked from Sony Pictures, executives have expressed their frustration at Netflix for not stopping users in Australia and elsewhere from bypassing geoblocks to access the streaming video service.
Mojang, the game's creator, allegedly ignored warnings for almost a year.
Forty accounts amounts to just 0.0005 percent of the site's total 8 million active accounts.
The tax season is a popular time for cybercriminals to strike -- but the risk of phishing campaigns is yet to come to an end.
Palo Alto Networks, McAfee, Websense gateway systems allow malicious traffic to slip through the net
Researchers claim a number of high-profile gateway solutions do little to interrupt or prevent malicious communications.
IBM's X-Force Exchange aims to be one of the largest and most thorough catalogs of vulnerabilities in the world, helping companies to defend against cyber-crimes in real-time.
Researchers who report vulnerabilities in Dropbox software can expect a cash reward.
Target will fund $19 million so MasterCard can settle complaints related to the 2013 data breach at the retailer.
Are your friends silly for Hillary? Crazy for Cruz? Facebook is alive with all sorts of requests to share annoying negative political posts and graphics. Here's how to mute most of it.
Data breaches, hacks, and vulnerable software makes it easier than ever for a hacker to get access to your data. These simple steps can help mitigate it happening in the first place.
Naikon was in for more than it bargained for when the group decided to strike another threat actor.
Verizon's new Data Breach Investigations Report 2015 says malware isn't a mobile epidemic, that breach costs are variable, and that the industry doesn't understand its adversaries.
Is it all about the money?
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 34 ways to improve your iPhone's battery life
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 Election 2016: How to filter politically sanctimonious Facebook posts from your news feed
- 5 So you have an app idea and want to make a bajillion bucks