Information security professionals need to get beyond 'blaming the user', says expert.
Information security professionals need to get beyond 'blaming the user', says expert.
When it comes to cybersecurity, what should you really be worried about?
At RSA 2017, we met with executives at IBM Security, HPE, Hytrust, Zscaler, and Bracket Computing to talk about challenges in cybersecurity, IoT security, data sovereignty, cloud-based security, and more.
They're after one thing -- money. And when they can't get it, they'll resort to any means necessary.
The experimental project aims to make file sharing easier.
Distributed denial of service attacks (DDoS) are growing ever bigger. Here's what's causing them.
This policy provides guidelines for the appropriate use of electronic communications. It covers privacy, confidentiality, and security and is intended to ensure that electronic communications resources...
Windows users will have to wait another three weeks to patch two serious vulnerabilities with exploit code when Microsoft's regular patching schedule resumes.
The government hopes its AU$1.9 million cyber-related university funding will reduce the skills shortage the industry is currently facing.
Everything you know about Windows deployment is undergoing wrenching changes. For IT pros who've grown accustomed to "set it and forget it" as a management strategy, three big changes are making life much more challenging.
That may sound like small change, but $350 million overall for two of the largest data breaches on record remains the steepest financial ding in history.
While Linux might be on millions of IoT devices, Kaspersky says there's no trace of it on its new secure OS.
Cybercriminals are increasingly targeting mobile devices with malicious software, as more and more people use them to store their most personal data.
Too many small and medium-sized businesses think they're not going to be targeted by ransomware. They're wrong.
Despite Microsoft's efforts to clarify and boost Windows 10 privacy controls, data-protection watchdogs still aren't satisfied.
The unpatched vulnerabilities can be exploited for attacks which should be of particular interest to the enterprise.
What are the best apps which offer strong encryption to keep out spying eyes?
There are great accessories out there to bring your Android and iOS photography to the next level.
Here are 10 easy steps to show you how to use the Tor network to mask your browsing habits.
Whether you are just paranoid or they really are out to get you, these handsets promise better security and privacy than standard phones.
The story of how Bletchley Park codebreakers decrypted top secret Nazi communications
One of the new features that Apple rolled out with iOS 9.3 is the ability to password-protect Notes you create. But it's not immediately clear how to do this. But once you know how, it's simple.
Interested in hacking and cybersecurity? Let's get started.
While cloud backups are quick and easy, if you want total control over your iPhone or iPad backups, the only way to do it is to make encrypted local backups. Here's how to do just that.
What apps, gadgets and accessories can help you protect your smartphones, tablets and laptops on the move?
Opinion: The FBI's attempt to order Apple to help them crack an iPhone has brought out the hysterical in many of us.
Here's a look at some of the devices, platforms and technology US President Barack Obama uses to carry out his day-to-day presidential duties.
Data breaches, hacks, and vulnerable software makes it easier than ever for a hacker to get access to your data. These simple steps can help mitigate it happening in the first place.
Updated: Almost every American has been affected by at least one data breach this year.
Meet some of the best security and privacy gadgets at this year's CES 2016 tech expo.
A look back at the hot topics, major deals, and the technological breakthroughs of the year -- from security to product launches, and the year's successes and catastrophes.
Trevor Hughes, president and CEO of the International Association of Privacy Professionals, explains how companies should prepare for GDPR and respond to global political uncertainty.
Edna Conway, Chief Security Officer for Cisco’s Global Value Chain, explains how she works with members of Cisco's value chain to keep it secure.
The cyber insurance market reveals how little trust there is in security vendors, argues Jeremiah Grossman, chief of security strategy at SentinelOne. He offers a solution.
Researchers warn how ransomware could do more than just encrypt your files.
At RSA 2017, we spoke with Tom Gillis, CEO of Bracket Computing, about how his product is changing cloud security and bringing big enterprise customers to the cloud.
Hackers are likely exploiting the easy-to-find vulnerabilities, according to the security researcher who warned the Pentagon of the flaws months ago.
The device provided key evidence -- which stopped a man allegedly getting away with fraud after burning down his house.
SonicWall said that ransomware was the payload of choice for malicious email campaigns and exploit kits in 2016.
Triada malware overtakes HummingBad for first time in over a year.
UK defense secretary says NATO must defend itself in cyberspace.
Since the start of the New Year, four asteroids have cozied up to Earth, getting closer than the moon. Coincidence? Scientists take a look.
Researchers show how an attacker can crack your Android pattern lock from a distance and that complex patterns are the easiest to identify.
Over the next 14 months, China intends to target 'unauthorised' VPNs as part of an internet 'clean up'.
Symantec Backup Exec System Recovery 8 provides flexibility when creating desktop and laptop backups. If you have high value data stored on your computer, then we think $106.53 is a reasonable price to ensure it's protected.
Symantec Backup Exec 12 allows complete system recovery and concentrates on continuous file/data protection. Though AU$1,795 may seem a lot of money for an application, Backup Exec might be worth the investment if you're using it for irreplaceable and highly valuable data.
Lavasoft Ad-Aware 2007 came in dead last in our CNET antispyware testing. Ad-Aware failed to detect half of the test spyware, and unlike nine out of the 10 other antispyware apps we reviewed in December 2007, left behind traces for all but one spyware.
This SSL VPN appliance suffers from an awkward admin interface and depends on ActiveX for some functionality, but it's still a relatively simple way to provide remote access to network applications.
Trend Micro's IGSA delivers relatively complete protection from viruses, spyware, spam and other threats at the internet gateway. However, you can't add your own scanning protocols and the restriction to Windows and IE clients for the Damage Cleanup Services feature is a drawback.
By porting its established security tools onto a powerful dual-core hardware platform, SmoothWall has come up with a highly effective and very scalable appliance that will appeal to a broad spectrum of buyers.
The ZyWALL SSL 10 would suit a small organisation that just wants general remote network access at a low price.
Fortinet has taken their proven UTM firmware and hardware experience and combined those with a 24-port network switch. While perhaps not suited to larger enterprises, the FortiGate-224B certainly represents an excellent proposition for SMB or branch office deployment and worthy of further research.
Symantec Backup Exec 11d performs well, installation is a breeze and considering the ability to backup and restore individual database records and substantially reduce downtime, it isn't difficult to justify the price.
This is a good choice for small companies looking to replace an internet router with a device that also supports SSL VPN remote access. However, it fails to stand out in the crowded SSL market.
The Google Mini takes much of the hassle out of deploying a search engine, doesn’t cost the earth and, best of all, it’s from Google: a winning combination.
Sony's ultra thin and ultra stylish T series Cyber-shot is back with the 6-megapixel DSCT9.
Network Box combines all that’s good in a managed security service with an affordable, locally installed and monitored appliance -- a winning combination for companies with limited resources.
The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.
The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.