Identity Finder Professional Edition is ideal for individuals and power users looking to protect their sensitive information on personal...
Showing results 1 to 20 of 45
The electronics retail giant published a more detailed timeline on Friday following an investigation that launched this fall.
Dropbox has now patched a security vulnerability which could give third parties access to server data without authorization.
Opinion: Comcast took a page from Snapchat's playbook to hush and downplay NullCrew FTS' successful hack on dozens of Comcast's servers — from an unpatched, easy-to-fix vulnerability dated December 2013 — which most likely exposed customer data.
Most companies don't have a BYOD policy, and of those that do, a quarter give C-suite executives special treatment, according to a survey by data backup vendor Acronis.
The amount of data sitting with service providers such as telcos has brought about security concerns and the potential vulnerability of their operations, according to ZDNet's TechBizz Singapore panelists.
Start securing your database in 15 minutes of less. Simply connect a laptop running AppDetectivePro to the network, and without agents,...
A vulnerability in a third-party application used on Drupal's servers have allowed attackers to access customer data, prompting the CMS developer to reset user passwords.
Corporate data, supply chains remain vulnerable to cyber crime attacks, says Open Group conference speaker
The countries that are adept at cyber, but whose economies are relatively undeveloped compared to ours, are at a big advantage, because they're not very lucrative targets for this kind of thing, and we are.
This update addresses the vulnerability addressed in the Microsoft Windows Security Bulletin MS04-026. A security issue has been identified...
Researchers at Columbia University have said they have uncovered a major security flaw in printers that could lead to data theft, vandalism or even a risk of fire.They say that the vulnerability, which involves rogue firmware updates that reprogram the printers and take control, could affect millions of devices already installed, that there is no easy fix, and no way to tell if it's already been exploited.
The handset manufacturer says the flaw, which appears to come from logging software HTC installs on its phones, will be fixed through an over-the-air update
Enisa, the EU's information security agency, has found 51 flaws in HTML 5 and other upcoming web standards that could let an attacker steal confidential information
Research in Motion (RIM) has shipped a patch to cover a serious security vulnerability that could allow attackers to read files that contain only printable characters on the BlackBerry Enterprise Server, including unencrypted text files.
Malicious links injected by hacker via cross-site scripting vulnerability in popular Chinese microblogging site nets over 30,000 victims but personal data not compromised, reports indicate.
The Victorian government's shared services agency CenITex has appointed Dimension Data (DiData) and McAfee to provide a threat and vulnerability management (TVM) product.
It has become known that sensitive data plugged into mobile apps are at risk. According to the computer security firm viaForensics, LinkedIn, Netflix, Foursquare and Square are the biggest culprits.
A whopping 99.7% of Android smartphones are leaking login data for Google services, and could allow other access to information stored in the cloud, so claim German security researchers Bastian Könings, Jens Nickels, and Florian Schaub from the University of Ulm.
With 2010 all but behind us, we take a look at the year that was from the eye of best (or worst) data breaches, blitz attacks and plain stupid security.
There's a real danger that the focus of data leakage prevention has been too restricted and could leave firms vulnerable, says Rik Ferguson
Contradicting industry calls, a top information forensic specialist has said mandatory data breach legislation will not reduce the number of breaches.
The company says it has fixed a hole that lets intruders bug calls and access other phone data with the latest release of its WebOS platform
A hole in the WebOS device allows phone calls and data to be recorded and sent to a hacker, while a separate flaw in Android could leak passwords and data
The best of ZDNet, delivered
- 1 33 ways to improve your iPhone's battery life
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 So you have an app idea and want to make a bajillion bucks