Identity Finder Professional Edition is ideal for individuals and power users looking to protect their sensitive information on personal...
Showing results 1 to 20 of 51
Recently discovered vulnerabilities are being used by the Russian APT28 group to spy on government targets and steal politically sensitive data.
The figures are from the Microsoft Vulnerabilities Report by UK-based security firm Avecto, in which the company pulled data from every Patch Tuesday issued by Microsoft in 2014.
Internet of Things devices are not originally built to be robust against attacks, resulting in vulnerabilities that can lead to severe repercussions if left unchecked, such as data that's being collected and acted upon in Singapore's smart nation plan.
The majority of dating apps have serious security vulnerabilities that put user data at risk. And because people are online dating at work, those risks are passed onto their employer.
The electronics retail giant published a more detailed timeline on Friday following an investigation that launched this fall.
VE-Disk is a small, compact program for creating encrypted virtual disks. It helps you keep your sensitive and vulnerable data and...
UPDATED. I ran the numbers and vulnerabilities in browsers are up this year, as is their severity. We know more about this for Internet Explorer because Microsoft provides the most data.
Yet another failure to tell users directly about security vulnerabilities highlights the need not just for mandatory data breach notification laws, but mandatory notification of security and privacy risks.
MS13-061, released on Tuesday to address 3 vulnerabilities in an Oracle component in Exchange Server, causes data to be inaccessible in Exchange Server 2013. Microsoft has pulled the update and released guidance for how to work around the problems it causes.
Most companies don't have a BYOD policy, and of those that do, a quarter give C-suite executives special treatment, according to a survey by data backup vendor Acronis.
Corporate data, supply chains remain vulnerable to cyber crime attacks, says Open Group conference speaker
The countries that are adept at cyber, but whose economies are relatively undeveloped compared to ours, are at a big advantage, because they're not very lucrative targets for this kind of thing, and we are.
Reporting of vulnerabilities and exploits essential to establish procedure consistency in security products as well as protect customers against cyberattacks, but companies that do so must practice discretion in data they divulge.
The handset manufacturer says the flaw, which appears to come from logging software HTC installs on its phones, will be fixed through an over-the-air update
Enisa, the EU's information security agency, has found 51 flaws in HTML 5 and other upcoming web standards that could let an attacker steal confidential information
Research in Motion (RIM) has shipped a patch to cover a serious security vulnerability that could allow attackers to read files that contain only printable characters on the BlackBerry Enterprise Server, including unencrypted text files.
The Victorian government's shared services agency CenITex has appointed Dimension Data (DiData) and McAfee to provide a threat and vulnerability management (TVM) product.
It has become known that sensitive data plugged into mobile apps are at risk. According to the computer security firm viaForensics, LinkedIn, Netflix, Foursquare and Square are the biggest culprits.
A whopping 99.7% of Android smartphones are leaking login data for Google services, and could allow other access to information stored in the cloud, so claim German security researchers Bastian Könings, Jens Nickels, and Florian Schaub from the University of Ulm.
The Australian Government has a list of software holes that are so sensitive they're kept hidden from the public. These weaknesses are being used by criminals to steal our money and our data. These vulnerabilities are also the bait with which cyber-criminals are caught.
Compared with Web servers, systems used to run mobile apps require more compute power and give users more access to previously off-limits data, notes security expert, who warns these developments open up more security vulnerabilities.
With 2010 all but behind us, we take a look at the year that was from the eye of best (or worst) data breaches, blitz attacks and plain stupid security.
The best of ZDNet, delivered
- 1 ZDNet Cloud TV: Hurdles to overcome (highlights)
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 34 ways to improve your iPhone's battery life
- 4 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 5 So you have an app idea and want to make a bajillion bucks