Let's hope no one every gets to invoke it though...
Let's hope no one every gets to invoke it though...
What's behind Facebook's shrinking bug bounty payouts to researchers who report flaws?
The new hire will have "oversight of relevant agency cybersecurity practices, and implementation across federal information technology system," according to the job description.
The flaw could allow an attacker to run arbitrary code as the logged-in user.
Starting today, Gmail messages sent or received from email providers that don't support TLS encryption will be flagged with a small broken padlock icon.
RightScale's latest survey of 1,000-plus IT managers finds hybrid cloud rules, and IT is at the center of the action. They are turning to DevOps and containers to make things happen.
The increase in cybersecurity funding is part of a $4.1 trillion spending plan.
After a number of high-profile defections from Twitter because of trolling, the micro-blogging service has now unveiled a new Trust and Safety Council to help guide its policies against abuse.
An influential group has called for changes to the government's controversial web surveillance plans.
Being hit by 'Error 53' is bad news for any iPhone owner. Here's what we know about this error so far.
Facebook has been given three months by France's data-protection watchdog to stop sending data to the US and violating users' right to privacy.
Adblock Plus maker Eyeo wants advertisers, browser makers, and publishers to join an independent body to regulate its whitelist of acceptable ads.
Researchers say the long-standing Poseidon malware boutique is blackmailing businesses through the theft of sensitive data.
Micron21 is preparing to deliver DDoS protection as a service to its global network, which will be hosted from its Melbourne-based datacentre from July.
The government has reported back on its open data policy, saying it could add between AU$500 million and AU$25 billion to the Australian economy.
From encrypted hard drives to NFC blockers, there is a variety of simple ways to protect yourself and your data.
Ashley Madison users have many priorities. Apparently, an airtight password is not one of them.
For decision makers charting cybercrime headline hysteria, the only option is to double-down on recognizing signs of BS in news about costs, losses, or threats.
If there's one thing we know this year, you're not safe anywhere -- at home, in your car, or online.
America's big information security conference comes into its 18th year with standing room only talks and a big-money expo, but still can't hire hackers fast enough to match industry growth.
Windows 10 doesn't make it easy for you to secure your privacy, but it can be done.
Take a plunge into the world of cybersecurity with these recommended reads.
What are the best five ways to stay safe online? Security professionals weigh in with these quick tips.
Using Adobe Flash can put your security and privacy at risk. Here's how to disable the plugin on Windows and Mac, and all major browsers.
Need a new book or two to read on the beach this summer? Check out our recommendations for technology fans.
From encrypted instant messengers to secure browsers, these security and privacy apps are some of the very best for protecting your devices.
From encrypted instant messengers to secure browsers and operating systems, these privacy-enhancing apps, extensions, and services can protect you both online and offline.
The first day of RSA 2015's exhibitor show floor was packed with booths and oodles of creative, sometimes bizarre, gimmicks to attract attention. These stand out from the rest.
With so many IT disasters occurring every day, it's hard to pick the worst of the worst, but here are some real standout foul-ups.
What is malware, what does it do and how do I protect myself?
Asia-Pacific CIO explains how Allianz Global Corporate & Specialty remained in operation during last year's Japan earthquake.
U.S. Deputy Secretary of Defense discusses need for industry and government collaboration to fight cyberthreats.
Trend Micro's IGSA delivers relatively complete protection from viruses, spyware, spam and other threats at the internet gateway. However, you can't add your own scanning protocols and the restriction to Windows and IE clients for the Damage Cleanup Services feature is a drawback.
By porting its established security tools onto a powerful dual-core hardware platform, SmoothWall has come up with a highly effective and very scalable appliance that will appeal to a broad spectrum of buyers.
The ZyWALL SSL 10 would suit a small organisation that just wants general remote network access at a low price.
Fortinet has taken their proven UTM firmware and hardware experience and combined those with a 24-port network switch. While perhaps not suited to larger enterprises, the FortiGate-224B certainly represents an excellent proposition for SMB or branch office deployment and worthy of further research.
Symantec Backup Exec 11d performs well, installation is a breeze and considering the ability to backup and restore individual database records and substantially reduce downtime, it isn't difficult to justify the price.
This is a good choice for small companies looking to replace an internet router with a device that also supports SSL VPN remote access. However, it fails to stand out in the crowded SSL market.
The Google Mini takes much of the hassle out of deploying a search engine, doesn’t cost the earth and, best of all, it’s from Google: a winning combination.
Sony's ultra thin and ultra stylish T series Cyber-shot is back with the 6-megapixel DSCT9.
Network Box combines all that’s good in a managed security service with an affordable, locally installed and monitored appliance -- a winning combination for companies with limited resources.
The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.
The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.
Check Point's Connectra 2.0 compares well on functionality and price with other enterprise-level SSL VPN solutions, with the added bonus of application and new endpoint security features.
LG's mid-range musical phone features dual colour displays and tri-band connectivity, but it lacks memory expansion options.
Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.