Articles about Security
Are your friends silly for Hillary? Crazy for Cruz? Facebook is alive with all sorts of requests to share annoying negative political posts and graphics. Here's how to mute most of it.
Your next big privacy threat won't come from the NSA or the FBI. The upcoming presidential campaigns will know a staggering amount about you personally. It's a bit scary and more than a little creepy.
Naikon was in for more than it bargained for when the group decided to strike another threat actor.
Verizon's new Data Breach Investigations Report 2015 says malware isn't a mobile epidemic, that breach costs are variable, and that the industry doesn't understand its adversaries.
Is it all about the money?
DDoS attackers are using shorter bursts of activity to infiltrate servers and networks in a large way, compared to the rest of DDoS attacks in Asia-Pacific.
Do you really think you can live a private life on the net? Think again.
NCR is trying to reinvent the ATM and make it more secure with a mix of Android, thin-client techniques and the cloud.
It's another Patch Tuesday, with this month's update including a slew of security fixes in a cumulative update for Internet Explorer. The most important patch on the list blocks an Office exploit that's already being used in "limited attacks" in the wild.
The investment firm is taking over Fidelis from General Dynamics with the intention of creating a new advanced threat defense service.
The company says the upgrade allows FireSphere to detect malware intrusions and contain outbreaks immediately and automatically.
Having emerged from stealth mode late last year, Illumio is wasting no time making a name for itself as an innovator in the security space. We talk to the company's CEO and cofounder Andrew Rubin.
Symantec's latest internet security report showed that Australia ranked as the seventh most targeted country globally when it came to social media scams in 2014.
Delegates at this week's Interpol World conference in Singapore urge for deeper industry collaboration, as populations become increasingly connected just as cybercriminals are increasingly collaborative.
A new study says the next generation of workers is placing the enterprise at risk with a lax attitude to mobile security.
2014 was a pretty rough year from a cybersecurity perspective. So that means that 2015 will be better, right? Right? Yeah, not so much. We'll tell you why.
Hundreds of millions of records have been stolen this year through hacks and data breaches as a result of poor, or flawed security. Here are the most notable stories of the year.
A look back at the hot topics, major deals, and the technological breakthroughs of 2014 -- from security to product launches, and the year's successes and catastrophes.
Worried about hackers and fraudsters gaining access to the data on your Android smartphone or tablet? You should be. But you can also reduce that risk by installing a security app on your device.
What scams and schemes do you need to watch out for during the holiday season?
Besides installing third-party software, there are several ways you can enhance your device's security through built-in controls in Android Lollipop.
What cybersecurity trends can we expect to see in the coming year?
With version 5.0, Android makes the work of enterprise admins much easier. Security is stronger and more standardized. Android fragmentation is crumbling.
And now, for your reading pleasure, we present the worst products and services and technology screw-ups of 2014.
When it comes to the specs, especially in the security architecture, Apple Pay looks good. But Apple isn't the only game in town when it comes to the retail space, and there are a lot of factors that might make this less of a slam-dunk than Apple might like. We look at six of them here.
Yes, it's Halloween of 2014, and we're here to revisit the technologies that are so frightening, they'll make you evacuate from multiple "interfaces".
Apps running in mobile operating systems must get permission from the user for all sorts of things. This can be confusing. Do some do it better than others?
Sponsored by Cisco
Why retailers need to take steps to earn shoppers' trust regarding their personal data
How do you vanish online? Follow these 10 steps to get started.
In almost every security incident there's some best practice that someone didn't follow. Here are six security technologies and techniques that would help in these cases.
Asia-Pacific CIO explains how Allianz Global Corporate & Specialty remained in operation during last year's Japan earthquake.
U.S. Deputy Secretary of Defense discusses need for industry and government collaboration to fight cyberthreats.
At the RSA conference in San Francisco, U.S. Deputy Secretary of Defense Ashton B. Carter talks about the need for the public and private sector to work together in defending the civilian infrastructure from cyberthreats.
The Google Mini takes much of the hassle out of deploying a search engine, doesn’t cost the earth and, best of all, it’s from Google: a winning combination.
Sony's ultra thin and ultra stylish T series Cyber-shot is back with the 6-megapixel DSCT9.
Network Box combines all that’s good in a managed security service with an affordable, locally installed and monitored appliance -- a winning combination for companies with limited resources.
The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.
The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.
Check Point's Connectra 2.0 compares well on functionality and price with other enterprise-level SSL VPN solutions, with the added bonus of application and new endpoint security features.
LG's mid-range musical phone features dual colour displays and tri-band connectivity, but it lacks memory expansion options.
Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.
With its quick scanning and multiple tools for stopping malware before it infects your computer, Spyware Doctor is a solid spyware remover.
Pest Patrol Anti-Spyware doesn't score highly in user-friendly or speed terms, although it is a extensively documented and perfectly competent Spyware removal solution.
The Proventia M10 appliance provides impressive and comprehensive network security at a surprisingly affordable price. However, it’s not as easy to deploy and manage as some of the alternatives and, as such, may not meet all small business requirements.
An 802.11g wireless router with an integrated ADSL modem suitable for multiple PC homes and small offices.
Nokia's 6230i is an upgraded version of its classic, unpretentious 6230 with a higher quality screen, 1.3-megapixel camera and Bluetooth.
D-Link's DCS-5300G is no real match for a dedicated wired and monitored solution, but it's also nowhere near as expensive.
The best of ZDNet, delivered
- 1 Election 2016: How to filter politically sanctimonious Facebook posts from your news feed
- 2 Facebook virus or account hacked? Here's how to fix it.
- 3 Four privacy settings you should enable in iOS 7 immediately
- 4 How to delete every Facebook wall post, wipe your Timeline
- 5 How to back up your Office 365 email database to your local computer