Articles about Security
Fortinet acquires Meru Networks for its technology to manage wireless networks as it rolls out a mobility service designed to better manage bring your own device environments.
Security researchers have published proof-of-concept code for a major router vulnerability leveraging a popular Linux kernel driver that could be used by hackers to compromise millions of connected devices.
Enabling encryption on your Apple smartphone or tablet is easier than you think.
With plans to spend S$2.2 billion in IT procurements this year, Infocomm Development Authority says the government is aiming to have up to 20 percent of IT services managed internally to gain better deployment speed and control.
Settlement was contingent on 90% of MasterCard issuers approving the deal
Want some very cool tricks (and helpful tips) for getting the most out of your Amazon Echo? You're in the right place. David Gewirtz details a dozen useful (and not so useful) how-tos in this article.
The federal agency said thieves used its "get transcript" system to access the data.
Japan's largest mobile service provider says it has taken a board seat with authentication consortium FIDO Alliance
The cloud-based identity management service is honing in on Google Apps provisioning, Chromebook password sync and Android for Work.
The court wants to know if Skype is a telecom operator. That could determine if it should hand over its call records.
The job of these lawless spies is unknown. Their motive, however, is to raise awareness.
Sometimes you can smell when it's not going to end well. It started with a routine email message in my inbox. But after reading the first few words, I could tell this was going to be one of those.
The team say tracking commuters on the metro is possible due to a lack of permissions required on Android phones.
The NitlovePOS malware spreads through phishing campaigns and extracts both track one and two payment card data.
For most people, encryption is seen as too hard to use, a bit niche, or something for the 'tin foil hat' brigade. A German project's hoping to change all that.
Here are six top-quality scanners that will help you clean up systems and keep them safe in the future. There are tools here for systems ranging from Windows XP to Windows 8.1.
2014 was a pretty rough year from a cybersecurity perspective. So that means that 2015 will be better, right? Right? Yeah, not so much. We'll tell you why.
Hundreds of millions of records have been stolen this year through hacks and data breaches as a result of poor, or flawed security. Here are the most notable stories of the year.
A look back at the hot topics, major deals, and the technological breakthroughs of 2014 -- from security to product launches, and the year's successes and catastrophes.
Worried about hackers and fraudsters gaining access to the data on your Android smartphone or tablet? You should be. But you can also reduce that risk by installing a security app on your device.
What scams and schemes do you need to watch out for during the holiday season?
Besides installing third-party software, there are several ways you can enhance your device's security through built-in controls in Android Lollipop.
What cybersecurity trends can we expect to see in the coming year?
With version 5.0, Android makes the work of enterprise admins much easier. Security is stronger and more standardized. Android fragmentation is crumbling.
And now, for your reading pleasure, we present the worst products and services and technology screw-ups of 2014.
When it comes to the specs, especially in the security architecture, Apple Pay looks good. But Apple isn't the only game in town when it comes to the retail space, and there are a lot of factors that might make this less of a slam-dunk than Apple might like. We look at six of them here.
Yes, it's Halloween of 2014, and we're here to revisit the technologies that are so frightening, they'll make you evacuate from multiple "interfaces".
Apps running in mobile operating systems must get permission from the user for all sorts of things. This can be confusing. Do some do it better than others?
Sponsored by Cisco
Why retailers need to take steps to earn shoppers' trust regarding their personal data
How do you vanish online? Follow these 10 steps to get started.
Asia-Pacific CIO explains how Allianz Global Corporate & Specialty remained in operation during last year's Japan earthquake.
U.S. Deputy Secretary of Defense discusses need for industry and government collaboration to fight cyberthreats.
At the RSA conference in San Francisco, U.S. Deputy Secretary of Defense Ashton B. Carter talks about the need for the public and private sector to work together in defending the civilian infrastructure from cyberthreats.
The Google Mini takes much of the hassle out of deploying a search engine, doesn’t cost the earth and, best of all, it’s from Google: a winning combination.
Sony's ultra thin and ultra stylish T series Cyber-shot is back with the 6-megapixel DSCT9.
Network Box combines all that’s good in a managed security service with an affordable, locally installed and monitored appliance -- a winning combination for companies with limited resources.
The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.
The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.
Check Point's Connectra 2.0 compares well on functionality and price with other enterprise-level SSL VPN solutions, with the added bonus of application and new endpoint security features.
LG's mid-range musical phone features dual colour displays and tri-band connectivity, but it lacks memory expansion options.
Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.
With its quick scanning and multiple tools for stopping malware before it infects your computer, Spyware Doctor is a solid spyware remover.
Pest Patrol Anti-Spyware doesn't score highly in user-friendly or speed terms, although it is a extensively documented and perfectly competent Spyware removal solution.
The Proventia M10 appliance provides impressive and comprehensive network security at a surprisingly affordable price. However, it’s not as easy to deploy and manage as some of the alternatives and, as such, may not meet all small business requirements.
An 802.11g wireless router with an integrated ADSL modem suitable for multiple PC homes and small offices.
Nokia's 6230i is an upgraded version of its classic, unpretentious 6230 with a higher quality screen, 1.3-megapixel camera and Bluetooth.
D-Link's DCS-5300G is no real match for a dedicated wired and monitored solution, but it's also nowhere near as expensive.