Hidely is the first zero-trace camera and private photo gallery for secure photo sharing!With Hidely you can take private encrypted...
Showing results 1 to 20 of 1,167
Apple has issued a security update to address a critical security issue with OS X's Network Time Protocol service.
The Android world this week saw reports of the premiere custom ROM maker getting its apps separated from its ROMs, an Android Wear watch vulnerability, and unlocking the Chromebook with Android.
The Acrobat updates are regularly-scheduled but the Flash and ColdFusion updates are a surprise. One Flash vulnerability is being exploited in the wild.
Google's Project Zero bug hunters have published details of a critical vulnerability in Adobe Reader for Windows that was patched in September.
Adobe's much-patched software receives "additional hardening" against a vulnerability patched silently last month.
CopyTrans Shelbee is a powerful tool that helps you effectuate full-featured user-friendly iOS backup and restore without iTunes. Use...
The Windows KDC didn't properly validate parts of Kerberos tickets. It may be possible for admins to detect if they have been exploited.
A privilege escalation bug being exploited in the wild could turn a normal user into a domain administrator.
This air combat sim game lets you fly a heavily armed and dangerous strike helicopter. This Apache heli is very agile and armed to...
The mysterious and critical Schannel vulnerability also contained some new TLS ciphers which are causing problems. Here's how to work around them.
The most serious vulnerability could allow an attacker to gain control of a Windows Server just by sending packets. For undisclosed reasons, Microsoft withheld two updates scheduled for release.
Details are emerging about a serious vulnerability found by a Swedish hacker in Apple's OS X Yosemite, called "Rootpipe." A patch isn't likely to appear until January 2015.
The 'Highly Critical' vulnerability revealed two weeks ago was widely exploited just hours after it was announced. But there's no evidence yet of actual, widespread attacks.
Turns out there was a bit of a vulnerability (and lack of communication) between Yahoo and Facebook. Whoops!
A vulnerability exists in Windows OLE for all versions except Server 2003. The company has released a workaround to block known attacks, but newer attacks could still get through.
The new vulnerability in the Bash shell is the worst we've seen in many years. No software on critical systems can be assumed as safe.
Within hours of the Shellshock Bash vulnerability emerging, attackers were actively scanning web servers and launching attacks.
Blackphone and communications security firm Silent Circle are offering hackers US$128 per security-related vulnerability found in its mobile operating system and associated platforms in a new bug bounty program.
A security flaw in Amazon's website can lead to malicious links being added to Kindle e-books, which one researcher says can be used to compromise a person's Amazon.com account.
Sponsored by Red Hat and Intel
Adoption of open source software in the enterprise continues to grow, with research suggesting the two largest factors fueling this growth are security and quality. Surprising, perhaps, given revelations of the much-publicised Heartbleed vulnerability discovered in a widely used open source cryptography library earlier this year.
"SynoLocker" malware infects through a vulnerability in older versions of their NAS software. The attack demands 0.6 BitCoins (about $350) to decrypt files.
Another system on the network could take root privileges on a vulnerable Samba client or server.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 3 31 ways to improve your iPhone's battery life
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 Review: Tile Bluetooth tag (verdict: Great)