Please notice that you need to remove the previous profile according to this instruction: http://support.betternet.co/hc/en-us/articles/205392458**Good...
Showing results 1 to 20 of 29,106
...but intelligence agency still wants access to encrypted communications.
Mozilla appears to abandon Firefox tracking protection initiative: Is privacy protection impossible?
A hidden feature in the open-source Firefox browser can cut load times for modern web pages nearly in half. So why isn't this feature easy to find and enable? Blame the well-funded online advertising industry.
The best way to speak out when the government gags you is before it comes knocking on your door.
Palo Alto Networks also published third quarter financial results after the bell on Wednesday.
Fortinet acquires Meru Networks for its technology to manage wireless networks as it rolls out a mobility service designed to better manage bring your own device environments.
Green Gallery is an entire new way to organize your photos. It's more than a tool. It's the most beautiful replacement for your built-in...
Security researchers have published proof-of-concept code for a major router vulnerability leveraging a popular Linux kernel driver that could be used by hackers to compromise millions of connected devices.
Enabling encryption on your Apple smartphone or tablet is easier than you think.
AR Chat Lock helps to protect your privacy like (messages - pictures - selfie - emails - history - friends and more) so you maintain...
Settlement was contingent on 90% of MasterCard issuers approving the deal
The federal agency said thieves used its "get transcript" system to access the data.
The court wants to know if Skype is a telecom operator. That could determine if it should hand over its call records.
The job of these lawless spies is unknown. Their motive, however, is to raise awareness.
The team say tracking commuters on the metro is possible due to a lack of permissions required on Android phones.
The NitlovePOS malware spreads through phishing campaigns and extracts both track one and two payment card data.
For most people, encryption is seen as too hard to use, a bit niche, or something for the 'tin foil hat' brigade. A German project's hoping to change all that.
When ordinary citizens in a modern democracy start taking precautions against government and corporate surveillance, it's time for a re-think.
That was despite increasing its dragnet order count by more than two-fold.
A collection of notable security news items for the week ending May 22, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
The FIDO alliance has certified 31 products and services under two protocols which aim to do away with the need for passwords.
Researchers have found that 500 milllion handsets may still leave users' personal details accessible even after a full factory reset.
Transport for New South Wales has confirmed that in just six months, NSW Police has made 166 requests for data on the Opal travel card.
The best of ZDNet, delivered
- 1 ZDNet Cloud TV: Hurdles to overcome (highlights)
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 34 ways to improve your iPhone's battery life
- 4 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 5 So you have an app idea and want to make a bajillion bucks