Are you clued up on this week's news?
Are you clued up on this week's news?
While NSA whistleblower Edward Snowden weighs into Allo controversy, Google 'cyber overlord' Thai Duong argues end-to-encryption is nice but what people really want is disappearing messages.
Online trackers add audio fingerprinting to their arsenal of tools to identify and follow people on the web.
The problem has been made worse due to vendors and users failing to update their firmware.
After the full extent of a LinkedIn breach was revealed, LeakedSource is one of the first to feel the effects.
The hacker's no Robin Hood, however, considering how the money was raised.
Encouraging companies to be honest about data breaches isn't enough, it seems. Some companies need more ... persuasion.
Well-known open-source developer and leader Brian Behlendorf is now the executive director of Hyperledger, a project for advancing enterprise open-source blockchain technology
The ten-line bill aims to stop the Supreme Court's rule change from taking effect.
Feds will have a harder time skirting the Fifth Amendment with a new fingerprint unlock rule.
Leak after leak, it's this one awful password that floats to the top of the list.
Can behavioral biometrics increase identity assurance and prevent online account takeover with continuous authentication for consumers? A new SDK from TeleSign aims to provide just that.
The developer has handed over the keys to the kingdom in a surprising twist in TeslaCrypt's tale.
The computer of one Bangladesh central bank official was targeted as the avenue into the bank's vaults.
We now know a lot more about the next version of Android, except its name. The most exciting new Android N feature is an answer to the age-old problem of pushing Android security updates to users.
As Brazilian consumers seek Black Friday offers online, many are putting their information at risk, according to research. We look at some of the risky behaviors of ecommerce users in Brazil.
ZDNet presents the worst tech products and services, embarrassing decisions, and other screw-ups of the year.
The latest BlackBerry phone lands with two flagship features: Android, and a physical keyboard.
This tough tablet can be bumped, scraped, and dropped, and even survive spills and dust. It's also secure through-and-through, with a trusted secure module chip and a fingerprint reader.
ZDNet provides a number of tips to protect the IoT devices installed in your smart home.
A basic guide to the Internet's underbelly -- the Dark Web.
There are a number of quick and easy ways to improve your personal privacy and safety when using public Internet services.
Privacy and anonymity are now paramount online -- so what do you need to know about one tool available, VPNs, to stay safe?
The security-focused phone gets a long-awaited refresh, with a brand new phablet-sized design and new privacy features.
From encrypted hard drives to NFC blockers, there is a variety of simple ways to protect yourself and your data.
Ashley Madison users have many priorities. Apparently, an airtight password is not one of them.
For decision makers charting cybercrime headline hysteria, the only option is to double-down on recognizing signs of BS in news about costs, losses, or threats.
If there's one thing we know this year, you're not safe anywhere -- at home, in your car, or online.
America's big information security conference comes into its 18th year with standing room only talks and a big-money expo, but still can't hire hackers fast enough to match industry growth.
Windows 10 doesn't make it easy for you to secure your privacy, but it can be done.
WatchGuard director of security strategy Corey Nachreiner walks the audience at AusCERT 2013 through some of the tools that hackers use to break into systems.
The widespread availability of cyberweapons, and increased enterprise vulnerability from mobile computing are among key issues troubling Art Coviello, executive chairman of security vendor RSA.
Join ZDNet editors and experts to hear more about how your smartphone could be compromised thanks to the ever-growing number of cybersecurity threats on the scene today.
This SSL VPN appliance suffers from an awkward admin interface and depends on ActiveX for some functionality, but it's still a relatively simple way to provide remote access to network applications.
Trend Micro's IGSA delivers relatively complete protection from viruses, spyware, spam and other threats at the internet gateway. However, you can't add your own scanning protocols and the restriction to Windows and IE clients for the Damage Cleanup Services feature is a drawback.
By porting its established security tools onto a powerful dual-core hardware platform, SmoothWall has come up with a highly effective and very scalable appliance that will appeal to a broad spectrum of buyers.
The ZyWALL SSL 10 would suit a small organisation that just wants general remote network access at a low price.
Fortinet has taken their proven UTM firmware and hardware experience and combined those with a 24-port network switch. While perhaps not suited to larger enterprises, the FortiGate-224B certainly represents an excellent proposition for SMB or branch office deployment and worthy of further research.
Symantec Backup Exec 11d performs well, installation is a breeze and considering the ability to backup and restore individual database records and substantially reduce downtime, it isn't difficult to justify the price.
This is a good choice for small companies looking to replace an internet router with a device that also supports SSL VPN remote access. However, it fails to stand out in the crowded SSL market.
The Google Mini takes much of the hassle out of deploying a search engine, doesn’t cost the earth and, best of all, it’s from Google: a winning combination.
Sony's ultra thin and ultra stylish T series Cyber-shot is back with the 6-megapixel DSCT9.
Network Box combines all that’s good in a managed security service with an affordable, locally installed and monitored appliance -- a winning combination for companies with limited resources.
The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.
The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.
Check Point's Connectra 2.0 compares well on functionality and price with other enterprise-level SSL VPN solutions, with the added bonus of application and new endpoint security features.
LG's mid-range musical phone features dual colour displays and tri-band connectivity, but it lacks memory expansion options.