Articles about Security
Hacker conference Chaos Communication Congress 31c3 is under way in Hamburg, Germany right now where three SS7 talks have revealed the ease of invasive cell phone surveillance.
Google's e-mail service apparently is no longer accessible in China and fingers are pointing to the country's Great Firewall filtering system as the reason for the outage.
Microsoft's Enhanced Mitigation Experience Toolkit (EMET) tightens the security screws in Windows and applications. It's set up for enterprise deployment and management.
A hacking group brought Christmas misery to gamers over the holidays and the pain with a Distributed Denial of Service attack.
Thanks to the seasonal holiday, I finally got around to reading Rogue Code, the third techno-thriller in the Jeff Aiken series. Like Zero Day and Trojan Horse, it delivers entertainment with serious messages about cybersecurity.
Pyongyang dismisses allegations it breached the system of South Korean nuclear power operator, Korea Hydro & Nuclear Power, which saw a spate of cyberattacks over the past week.
The ISC site, home to the world's most popular Domain Name System program BIND, appears to have been infected with malware.
The anonymity service, attacked by hackers who brought down gaming services over Christmas, was never in any danger during this attack, experts say.
Innovation will confine passwords within a broader equation around authentication type plus value of resource
A collection of notable security news items for the week ending December 26, 2014. Covers enterprise, controversies, reports and more.
Data including usernames, passwords, and e-mail addresses belonging to customers of China's official online train ticketing site, 12306.cn, have been leaked, according to an IT security vendor.
Sony will release "The Interview" via a bevy of online services and may just upend the current way of doing business. Here's a look at the ramifications.
IT security is about more than just the hardware and software. Experts give their view on where the buck really stops.
The Sony Pictures Entertainment hack is certainly a custard duck of fabulous proportions, but it ain't no cyberwar -- and the media should know this by now.
A 21 percent jump in fraud helps convince European Banking Authority to issue revised final set of directives planned for 2015 implementation.
A number of free and open-source projects exist solely to protect your identity and online activity. Here are just a few to make you more secure in the new year.
2014 was a pretty rough year from a cybersecurity perspective. So that means that 2015 will be better, right? Right? Yeah, not so much. We'll tell you why.
Hundreds of millions of records have been stolen this year through hacks and data breaches as a result of poor, or flawed security. Here are the most notable stories of the year.
A look back at the hot topics, major deals, and the technological breakthroughs of 2014 -- from security to product launches, and the year's successes and catastrophes.
Worried about hackers and fraudsters gaining access to the data on your Android smartphone or tablet? You should be. But you can also reduce that risk by installing a security app on your device.
What scams and schemes do you need to watch out for during the holiday season?
Besides installing third-party software, there are several ways you can enhance your device's security through built-in controls in Android Lollipop.
What cybersecurity trends can we expect to see in the coming year?
With version 5.0, Android makes the work of enterprise admins much easier. Security is stronger and more standardized. Android fragmentation is crumbling.
And now, for your reading pleasure, we present the worst products and services and technology screw-ups of 2014.
When it comes to the specs, especially in the security architecture, Apple Pay looks good. But Apple isn't the only game in town when it comes to the retail space, and there are a lot of factors that might make this less of a slam-dunk than Apple might like. We look at six of them here.
Yes, it's Halloween of 2014, and we're here to revisit the technologies that are so frightening, they'll make you evacuate from multiple "interfaces".
Apps running in mobile operating systems must get permission from the user for all sorts of things. This can be confusing. Do some do it better than others?
Sponsored by Cisco
Why retailers need to take steps to earn shoppers' trust regarding their personal data
How do you vanish online? Follow these 10 steps to get started.
If a website falls under attack by a hacker, why shouldn't it be able to respond? Juniper Networks shows ZDNet how businesses can fight back against common website attacks and help others know what is coming.
Hurricane Sandy was a major test for New York City IT departments and the disaster recovery plans they put in place following 9/11. Here is some of the best DR advice from IT leaders whose companies survived it.
ZDNet gathered several market players in a roundtable discussion held in Singapore, and asked if organizations in Asia were doing enough today to support bring-your-own-device adoption.
WatchGuard director of security strategy Corey Nachreiner walks the audience at AusCERT 2013 through some of the tools that hackers use to break into systems.
Nigerian scam victim Jill explains how she was conned out of $300,000 over a four year period.
What do security specialist HD Moore and the Queensland Police have in common? They both feature in this lighthearted round-up of day 1 at AusCERT 2013.
ZDNet's IT Priorities 2013 panel discussion debated the evolving role of CIOs in Asia as well as the role of ICT as a driver of innovation for organizations in this region.
Asia-Pacific CIO explains how Allianz Global Corporate & Specialty remained in operation during last year's Japan earthquake.
Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.
An ideal backup tool for small businesses and larger enterprises alike, vmProtect 6 makes light work of protecting and rapidly recovering virtual machines on VMware vSphere hosts.
SonicWALL's feature-packed TZ 210 gateway security appliance is capable of protecting all kinds of networks at a very affordable price. It's easy to setup and manage, and sets a new price point in the UTM market.
McAfee Internet Security 2009 does a reasonable job, but it also leaves room for improvement.
As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.
Symantec Backup Exec System Recovery 8 provides flexibility when creating desktop and laptop backups. If you have high value data stored on your computer, then we think $106.53 is a reasonable price to ensure it's protected.
Symantec Backup Exec 12 allows complete system recovery and concentrates on continuous file/data protection. Though AU$1,795 may seem a lot of money for an application, Backup Exec might be worth the investment if you're using it for irreplaceable and highly valuable data.
Lavasoft Ad-Aware 2007 came in dead last in our CNET antispyware testing. Ad-Aware failed to detect half of the test spyware, and unlike nine out of the 10 other antispyware apps we reviewed in December 2007, left behind traces for all but one spyware.
This SSL VPN appliance suffers from an awkward admin interface and depends on ActiveX for some functionality, but it's still a relatively simple way to provide remote access to network applications.
Trend Micro's IGSA delivers relatively complete protection from viruses, spyware, spam and other threats at the internet gateway. However, you can't add your own scanning protocols and the restriction to Windows and IE clients for the Damage Cleanup Services feature is a drawback.
By porting its established security tools onto a powerful dual-core hardware platform, SmoothWall has come up with a highly effective and very scalable appliance that will appeal to a broad spectrum of buyers.
The ZyWALL SSL 10 would suit a small organisation that just wants general remote network access at a low price.
Fortinet has taken their proven UTM firmware and hardware experience and combined those with a 24-port network switch. While perhaps not suited to larger enterprises, the FortiGate-224B certainly represents an excellent proposition for SMB or branch office deployment and worthy of further research.
Symantec Backup Exec 11d performs well, installation is a breeze and considering the ability to backup and restore individual database records and substantially reduce downtime, it isn't difficult to justify the price.
This is a good choice for small companies looking to replace an internet router with a device that also supports SSL VPN remote access. However, it fails to stand out in the crowded SSL market.