Articles about Security
Adobe says it will deliver a fix for a newly discovered flaw that is being used in drive-by download attacks, but the patch won't be ready until at least next Monday.
Google's security team has disclosed three separate zero-day vulnerabilities on Apple's OS X platform. It seems annoying Microsoft wasn't enough.
A study by IDC, commissioned by FireEye, has shown that organisations continue to be overwhelmed by security alerts, especially redundant ones, but they are turning to third-party IT security management to reduce the risk of missing critical alerts.
The peak national body representing companies including Apple, Google, Telstra, and Optus has said that the Australian government's draft data-retention legislation is too ambiguous.
Australian Customs and Border Protection Service has said that it would increase its surveillance of Australians' telecommunications should the mandatory data-retention legislation pass.
A senior European official wants to force internet and phone companies operating in Europe to share encryption keys, under the guise of preventing terrorism.
FireEye's latest report suggests that a number of businesses face over 10,000 cybersecurity alerts per month. What is being done to combat potential attacks?
New attacks on Flash Player may force Adobe to issue another patch just days after fixing nine flaws.
Microsoft handed over data linked to the Charlie Hebdo terrorist attack to the FBI in double-quick time, noting that extra snooping should only happen under certain circumstances.
Developers can now incorporate Twitter's Digits white-label login offering to their mobile applications' companion websites, following the release of Digits login for web.
The lobby group representing technology giants including Google, Twitter, Microsoft, and Facebook has said that the mandatory data-retention legislation before the Australian parliament could see its own services caught up by the scheme.
WhatsApp is now available on your desktop, but only if you use Google Chrome and have the mobile app installed on a non-iOS device.
Oracle's latest CPU includes a vast number of security fixes, with Oracle Database and Middleware issues at the top of the list.
What factors does the enterprise need to consider when creating cybersecurity risk policies?
The Online Trust Alliance says that a high percentage of data breaches were the result of staff mistakes -- rather than external hacking.
Sponsored by Cisco
Why retailers need to take steps to earn shoppers' trust regarding their personal data
How do you vanish online? Follow these 10 steps to get started.
In almost every security incident there's some best practice that someone didn't follow. Here are six security technologies and techniques that would help in these cases.
In the era of BYOD, the less technical among us are prime targets for cybercrime attacks against your company. Learn the six top ways non-tech people get hacked.
Step-by-step instructions to help you tighten security and dramatically reduce the risk that crucial cloud services will be compromised. If you use a Microsoft or Google account, Office 365, Dropbox, Facebook, or Twitter, keep reading.
Hands-on: Buying Norton for your PC or Mac just got a lot simpler. The product has a rich set of features and the threat protection is excellent.
Time and again we write about security breaches that would have been prevented by two-factor authentication. What are the ways people do this in the real world?
Your home router is vulnerable to attacks as soon as you take it out of the box. Here are six things you can do to secure your network.
America's biggest hacker conference is setting a new record for attendance at its 22nd annual event, at the Rio, Las Vegas, Nevada -- and its vendors reflect the event's growth.
Leading security conference Black Hat showcased its 2014 USA vendors and sponsors in its sprawling new location at Mandalay Bay, Las Vegas, Nevada.
My Amazon home page shows me how much the company knows about me and my online activities. Here we show you which privacy and security settings can help you reduce the information Amazon holds about you.
Here are six top-quality scanners that will help you clean up systems and keep them safe in the future. There are tools here for systems ranging from Windows XP to Windows 8.1.
As the World Cup kicks off, we list five technology projects rolled out across the venues that will be hosting the tournament in Brazil over the next month.
SoSecurity faces a tough road to obtain funding for its top-notch SSD drive, but bigger companies may be drooling to take it over.
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
U.S. Deputy Secretary of Defense discusses need for industry and government collaboration to fight cyberthreats.
At the RSA conference in San Francisco, U.S. Deputy Secretary of Defense Ashton B. Carter talks about the need for the public and private sector to work together in defending the civilian infrastructure from cyberthreats.
The Google Mini takes much of the hassle out of deploying a search engine, doesn’t cost the earth and, best of all, it’s from Google: a winning combination.
Sony's ultra thin and ultra stylish T series Cyber-shot is back with the 6-megapixel DSCT9.
Network Box combines all that’s good in a managed security service with an affordable, locally installed and monitored appliance -- a winning combination for companies with limited resources.
The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.
The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.
Check Point's Connectra 2.0 compares well on functionality and price with other enterprise-level SSL VPN solutions, with the added bonus of application and new endpoint security features.
Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.
Pest Patrol Anti-Spyware doesn't score highly in user-friendly or speed terms, although it is a extensively documented and perfectly competent Spyware removal solution.
The Proventia M10 appliance provides impressive and comprehensive network security at a surprisingly affordable price. However, it’s not as easy to deploy and manage as some of the alternatives and, as such, may not meet all small business requirements.
An 802.11g wireless router with an integrated ADSL modem suitable for multiple PC homes and small offices.
D-Link's DCS-5300G is no real match for a dedicated wired and monitored solution, but it's also nowhere near as expensive.
This SSL-based VPN appliance will appeal to enterprises with large numbers of remote users to manage, where the scalability and clustering facilities help it stand out from the crowd.
Although it's beyond the means of most small businesses, InterSpect is worth consideration by larger enterprises concerned about growing internal threats to their networks.
This is an impressive big-company email security solution with top-name antivirus and anti-spam tools. But this market is very crowded, and alternatives do more for less.