The hacker, caught in Prague, may be extradited to the US.
The hacker, caught in Prague, may be extradited to the US.
The region has become an autonomous business unit.
Learn the two watershed moments for IT in the military over the past 50 years and the four most important domains of cybersecurity, according to former DoD chief Robert Gates at Gartner Symposium.
Combining Dell Data Security Solutions, Mozy by Dell, RSA, and VMware AirWatch, Dell Technologies has released a new product suite focused on endpoint data security.
Even if your code is hacker-proof, there's still one way into your systems and it's much tougher to patch.
The open-source encryption software contains severe security problems -- and not all of them can be patched immediately.
Third time might be the charm as Australia could get data breach notification laws if they are not stranded in Parliament again.
In a region that spans the gamut of 'world leading' to trailing nations in the use of technology, it is in Australia's interest to help those fallen behind to catch up, the head of the International Cyber Policy Centre at the Australian Strategic Policy Institute has said.
When managing a business based mainly on trust and reputation, Australia's iSelect believes it is best practice to partner with a security vendor rather than tackling threats internally.
Given a choice between security and free Wi-Fi, almost all of us will use the free internet connection.
The huge theft of customer data affected over 500 million users.
The security researcher was swiftly attacked by Trump supporters who couldn't understand that the information was publicly accessible.
Malware found on the website allowed hackers to siphon off your credit card data.
Metropolitan Police Service plans to give cameras to thousands of officers in UK's capital.
The Justice Department is becoming increasingly desperate when it comes to unlocking smartphones that come with full-disk encryption.
What apps, gadgets and accessories can help you protect your smartphones, tablets and laptops on the move?
Opinion: The FBI's attempt to order Apple to help them crack an iPhone has brought out the hysterical in many of us.
Here's a look at some of the devices, platforms and technology US President Barack Obama uses to carry out his day-to-day presidential duties.
Data breaches, hacks, and vulnerable software makes it easier than ever for a hacker to get access to your data. These simple steps can help mitigate it happening in the first place.
Updated: Almost every American has been affected by at least one data breach this year.
Meet some of the best security and privacy gadgets at this year's CES 2016 tech expo.
A look back at the hot topics, major deals, and the technological breakthroughs of the year -- from security to product launches, and the year's successes and catastrophes.
Updated: Before you do anything on your new iPhone or iPad, you should lock it down. Here are the important tweaks you need to protect your privacy.
Buying on a budget? These gadgets are the very best on the market for their price.
As Brazilian consumers seek Black Friday offers online, many are putting their information at risk, according to research. We look at some of the risky behaviors of ecommerce users in Brazil.
ZDNet presents the worst tech products and services, embarrassing decisions, and other screw-ups of the year.
The latest BlackBerry phone lands with two flagship features: Android, and a physical keyboard.
This tough tablet can be bumped, scraped, and dropped, and even survive spills and dust. It's also secure through-and-through, with a trusted secure module chip and a fingerprint reader.
ZDNet provides a number of tips to protect the IoT devices installed in your smart home.
A basic guide to the Internet's underbelly -- the Dark Web.
Measurement and standardisation are concepts the insurance industry loves, will security adjust now that businesses can buy breach insurance?
The ORWL by Design Shift is a portable PC with anti-tampering tech baked in.
Samsung's Galaxy Note 7 adds iris scanning as an additional layer of security. Enterprises need to watch how it scales and integrate it into security policies.
The flaw, which allows a malicious website to extract user passwords, is made worse if a user is logged in with a Microsoft account.
SMS as a two-factor authentication method will soon be discouraged, according to draft guidelines from US standards body.
Consumers still aren't doing their homework before buying and deploying internet-connected baby monitors and other products.
Symantec Backup Exec 12 allows complete system recovery and concentrates on continuous file/data protection. Though AU$1,795 may seem a lot of money for an application, Backup Exec might be worth the investment if you're using it for irreplaceable and highly valuable data.
Lavasoft Ad-Aware 2007 came in dead last in our CNET antispyware testing. Ad-Aware failed to detect half of the test spyware, and unlike nine out of the 10 other antispyware apps we reviewed in December 2007, left behind traces for all but one spyware.
This SSL VPN appliance suffers from an awkward admin interface and depends on ActiveX for some functionality, but it's still a relatively simple way to provide remote access to network applications.
Trend Micro's IGSA delivers relatively complete protection from viruses, spyware, spam and other threats at the internet gateway. However, you can't add your own scanning protocols and the restriction to Windows and IE clients for the Damage Cleanup Services feature is a drawback.
By porting its established security tools onto a powerful dual-core hardware platform, SmoothWall has come up with a highly effective and very scalable appliance that will appeal to a broad spectrum of buyers.
The ZyWALL SSL 10 would suit a small organisation that just wants general remote network access at a low price.
Fortinet has taken their proven UTM firmware and hardware experience and combined those with a 24-port network switch. While perhaps not suited to larger enterprises, the FortiGate-224B certainly represents an excellent proposition for SMB or branch office deployment and worthy of further research.
Symantec Backup Exec 11d performs well, installation is a breeze and considering the ability to backup and restore individual database records and substantially reduce downtime, it isn't difficult to justify the price.
This is a good choice for small companies looking to replace an internet router with a device that also supports SSL VPN remote access. However, it fails to stand out in the crowded SSL market.
The Google Mini takes much of the hassle out of deploying a search engine, doesn’t cost the earth and, best of all, it’s from Google: a winning combination.
Sony's ultra thin and ultra stylish T series Cyber-shot is back with the 6-megapixel DSCT9.
Network Box combines all that’s good in a managed security service with an affordable, locally installed and monitored appliance -- a winning combination for companies with limited resources.
The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.
The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.