Researchers can earn up to $20,000 for disclosing critical security flaws.
Researchers can earn up to $20,000 for disclosing critical security flaws.
2,800 patient operations were cancelled in total, hospital confirms -- but no word on how Globe2 ransomware infection occurred.
The video-sharing site remains one of the most visited websites on the internet.
The predicted explosion of voice-enabled apps in 2017 will increase the attack service of mobile devices and the systems they control, and create brand new privacy risks.
The Australian government has appointed the Atlassian director as CEO of its new Cyber Security Growth Centre.
In a new face-to-face interview, Edward Snowden said the US justice department has a "two-tiered system of justice" and used Gen. Petraeus as an example.
Interested in knowing what information a website has access to about you as soon as you visit a page? Here are a couple of websites that will show you what information you are leaking as you browse the internet.
Neural networks may be the hot topic these days, but they're far from infallible.
A concerted effort between law enforcement and cybersecurity firms has resulted in the destruction of a major botnet platform.
Labor lashes out at Coalition for failing to pass a bill that it failed to pass in 2013.
Frightened of your site getting blown off the internet with a distributed denial of service attack? Amazon can protect you with AWS Shield.
The Avalanche family of malware has cost users more than $6 million in damages.
Dysfunctional Android patching comes back to bite Google via two million fraudulent installs from Google Play in three months.
If the government created this Firefox and Tor Browser exploit, it just endangered all web users, argues Mozilla.
One leading senator called the expansion in powers 'one of the biggest mistakes in surveillance policy in years'.
Interested in hacking and cybersecurity? Let's get started.
If the Internet is built into everything you own, none of it will be truly safe from hackers.
While cloud backups are quick and easy, if you want total control over your iPhone or iPad backups, the only way to do it is to make encrypted local backups. Here's how to do just that.
What apps, gadgets and accessories can help you protect your smartphones, tablets and laptops on the move?
Opinion: The FBI's attempt to order Apple to help them crack an iPhone has brought out the hysterical in many of us.
Here's a look at some of the devices, platforms and technology US President Barack Obama uses to carry out his day-to-day presidential duties.
Data breaches, hacks, and vulnerable software makes it easier than ever for a hacker to get access to your data. These simple steps can help mitigate it happening in the first place.
Updated: Almost every American has been affected by at least one data breach this year.
Meet some of the best security and privacy gadgets at this year's CES 2016 tech expo.
A look back at the hot topics, major deals, and the technological breakthroughs of the year -- from security to product launches, and the year's successes and catastrophes.
Updated: Before you do anything on your new iPhone or iPad, you should lock it down. Here are the important tweaks you need to protect your privacy.
Buying on a budget? These gadgets are the very best on the market for their price.
As Brazilian consumers seek Black Friday offers online, many are putting their information at risk, according to research. We look at some of the risky behaviors of ecommerce users in Brazil.
ZDNet presents the worst tech products and services, embarrassing decisions, and other screw-ups of the year.
The latest BlackBerry phone lands with two flagship features: Android, and a physical keyboard.
If we can't protect our laptops, why should we think we can protect a fleet of robots?
Craig Davies, head of security at Atlassian, explains how the company has built a "playbook" for responding to attacks -- and how he gets everyone to follow it.
On the sidelines of the Structure Security conference in San Francisco, Arthur Coviello, a venture partner with Rally Ventures, talks about why we need to get ahead of security risks as the Internet of Things flourishes.
Jay Leek, chief information security officer at Blackstone, says the private equity giant has automated much of its security operations as well as initial investigations. The move has enabled his human security analysts to be more productive and focus on more high-value work.
Nathaniel Gleicher, Head of Cybersecurity Strategy at Illumio and former Director for Cybersecurity Policy at the White House National Security Council, on how security in the physical world compares to security in the data center.
When an infosec emergency happens, but it is not large enough for the national security organisations to get involved, who are you going to call?
Downloads of malware that may not be recognised by security systems happens every few seconds, research has found.
Microsoft is opening its third Transparency Center, to be located in the Chinese capital of Beijing.
Measurement and standardisation are concepts the insurance industry loves, will security adjust now that businesses can buy breach insurance?
Symantec Backup Exec 12 allows complete system recovery and concentrates on continuous file/data protection. Though AU$1,795 may seem a lot of money for an application, Backup Exec might be worth the investment if you're using it for irreplaceable and highly valuable data.
Lavasoft Ad-Aware 2007 came in dead last in our CNET antispyware testing. Ad-Aware failed to detect half of the test spyware, and unlike nine out of the 10 other antispyware apps we reviewed in December 2007, left behind traces for all but one spyware.
This SSL VPN appliance suffers from an awkward admin interface and depends on ActiveX for some functionality, but it's still a relatively simple way to provide remote access to network applications.
Trend Micro's IGSA delivers relatively complete protection from viruses, spyware, spam and other threats at the internet gateway. However, you can't add your own scanning protocols and the restriction to Windows and IE clients for the Damage Cleanup Services feature is a drawback.
By porting its established security tools onto a powerful dual-core hardware platform, SmoothWall has come up with a highly effective and very scalable appliance that will appeal to a broad spectrum of buyers.
The ZyWALL SSL 10 would suit a small organisation that just wants general remote network access at a low price.
Fortinet has taken their proven UTM firmware and hardware experience and combined those with a 24-port network switch. While perhaps not suited to larger enterprises, the FortiGate-224B certainly represents an excellent proposition for SMB or branch office deployment and worthy of further research.
Symantec Backup Exec 11d performs well, installation is a breeze and considering the ability to backup and restore individual database records and substantially reduce downtime, it isn't difficult to justify the price.
This is a good choice for small companies looking to replace an internet router with a device that also supports SSL VPN remote access. However, it fails to stand out in the crowded SSL market.
The Google Mini takes much of the hassle out of deploying a search engine, doesn’t cost the earth and, best of all, it’s from Google: a winning combination.
Sony's ultra thin and ultra stylish T series Cyber-shot is back with the 6-megapixel DSCT9.
Network Box combines all that’s good in a managed security service with an affordable, locally installed and monitored appliance -- a winning combination for companies with limited resources.
The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.
The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.