Articles about Security
In Germany, data watchdogs will meet this week to debate the future of the Safe Harbor agreement in the post-Snowden world.
Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
Google finally explains why it's wiping its hands clean of patches for flaws in WebView running on Android 4.3 and below - and what users should do to stay safe.
A beta of the next OS X update for Mac users contains a patch for the Thunderstrike vulnerability that allows malware to be injected into Macs via the Thunderbolt port, which means a fix is on the way.
It wouldn't be another news week if our governments didn't disappoint us in some way or another. The UK seems to be tiring of civil liberties, Russia is tiring of civility, and North Korea is way overdue for its little nap. Plus (no surprise), the Department of Homeland Security is insecure.
A collection of notable security news items for the week ending January 23, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
It looks like ISPs and telcos may soon be facing the prospect of filtering their customers' data once again, thanks to proposed amendments to the Counter-Terrorism and Security Bill.
Adobe says it will deliver a fix for a newly discovered flaw that is being used in drive-by download attacks, but the patch won't be ready until at least next Monday.
Google's security team has disclosed three separate zero-day vulnerabilities on Apple's OS X platform. It seems annoying Microsoft wasn't enough.
A study by IDC, commissioned by FireEye, has shown that organisations continue to be overwhelmed by security alerts, especially redundant ones, but they are turning to third-party IT security management to reduce the risk of missing critical alerts.
The peak national body representing companies including Apple, Google, Telstra, and Optus has said that the Australian government's draft data-retention legislation is too ambiguous.
Australian Customs and Border Protection Service has said that it would increase its surveillance of Australians' telecommunications should the mandatory data-retention legislation pass.
A senior European official wants to force internet and phone companies operating in Europe to share encryption keys, under the guise of preventing terrorism.
FireEye's latest report suggests that a number of businesses face over 10,000 cybersecurity alerts per month. What is being done to combat potential attacks?
New attacks on Flash Player may force Adobe to issue another patch just days after fixing nine flaws.
Ten attacks on corporations and individuals by hackers and governments, and all of them could have been prevented if people had followed best practices.
What are some of the best apps on the market to keep your iPhone and iPad safe, secure, and able to be located?
If you have just one password for everything it's easy to remember, but we all know that isn't safe. So how do you keep track of a large number of them - and not have to worry about it?
Behind on the news and hungry for more? Here's what we learned this week — including which city is doing more for tech than Silicon Valley, and Samsung's biggest ally.
There have been some pretty bad vulnerabilities before Heartbleed. Is it really any more severe than CodeRed or Blaster?
If you're late to upgrade or have decided not to change your operating system, check out these tips to keep the system as secure as possible.
This high tech, hurricane-resistant and ultra-secure facility in Fort Lauderdale is where Florida's elite store their exotic cars, precious valuables, works of art and wine collections.
Employees are prime targets for cybercrime attacks against your company. Find out the six top ways criminals gain access to your valuable data, IP, and more.
A wargame aimed at finding hidden cyber-security talent took place in Winston Churchill's wartime bunker.
Maintaining privacy online seems almost impossible, but there are a tools that can minimise the chances of your personal, financial or business data falling into the wrong hands.
What are some simple tips, tricks and best-practice methods of keeping yourself and your digital identity safe from hackers?
Behind on the news and hungry for more? Here's what we learned this week — from tweets leading to bank hacks, Windows XP lives, and who is the elusive Bitcoin inventor?
There are many reasons why users will be sticking with Windows XP after Microsoft ends all support next month. In the final analysis, none of them are good excuses.
Behind on the news and hungry for more? Here's what we learned this week — from webcam hacking, net neutrality, and all the things that are cheaper to buy than WhatsApp.
At informal infosec conference Security B-Sides SF, former Black Hat General Manager and current Global Strategist for Rapid7 Trey Ford outlined the gaps between hacking and legislation in America.
Although video is beginning to take up a large portion of traffic on the internet, search engines aren't yet at the stage where they can completely index and understand the content. ZDNet Australia speaks to Adobe on how to overcome these issues using metadata.
Speaking Tuesday at a Churchill Club event in Palo Alto, Calif., the country's Chief Information Officer Steven VanRoekel discusses innovation in the federal IT landscape. He says cybersecurity concerns should not be used as an excuse not to innovate.
Governments worldwide are investing in cyber armies and intelligence to counter growing online threats.
At the WWDC conference in San Francisco, Apple CEO Steve Jobs unveils iTunes Match, part of the company's new iCloud service. For a $24.99 annual fee, users can use iTunes Match to scan their music library for non-iTunes purchased songs. Apple then provides a DRM-free file of those songs for access from iCloud.
This is a good first attempt at a mail server security appliance, but it needs more development to challenge the longer-established vendors.
Unique MailHurdle technology makes the RazorGate 100 stand out, but it's a little on the expensive side.
This mail server security appliance is child’s play to set up and manage, and great for companies with limited technical expertise.
The Barracuda Spam Firewall 400 does its job well, but the extensive configuration options make it somewhat complicated to manage.
This appliance provides corporate-grade network protection that's both affordable and easy to live with -- a hard to beat combination for the smaller business.
Want to remain anonymous while you surf? Check out Tenebril's GhostSurf, which encrypts your Internet connection and provides some useful security-related utilities into the bargain.
ZoneAlarm Security Suite puts Norton Internet Security and McAfee Internet Security to shame with its easy-to-use features.ZoneAlarm's Security Suite is one of the best security suites we've seen.
Bargain hunters, ZoneAlarm with Antivirus is the security deal for you.Zone Labs' popular ZoneAlarm firewall, available in both free and fee versions, has always been a lone wolf in the realm of PC security.
McAfee AntiSpyware's automated spyware scanning makes this a sensible addition to any PC's security measures.McAfee AntiSpyware is a solid entry in the spyware-removal category.
This richly-featured gateway and firewall allows IT managers in small/medium-sized businesses to secure their networks easily.
This sleek and very thin Sony is good for on-the-go snapshots, but its photo quality is average.With a depth of only 8/10 of an inch, the Sony Cyber Shot DSC-T1 is one of the slimmest digital cameras we've seen.
ZoneAlarm Pro 4.0 is a great firewall for security novices, but you'll still need a separate anti-virus program.
This innovative solution provides a bridge between outsourced and in-house network security, and could appeal to many an SME.
Spybot blows the venerable Ad-aware out of the water when it comes to protecting you against ad-serving software.
PC Immobiliser is a simple device that should increase the security of any PC or notebook, and make it less attractive to thieves. The use of iButtons to restrict access to anyone who doesn’t have the correct token works seamlessly once set up.
The best of ZDNet, delivered
- 1 Seven privacy settings you should change immediately in iOS 8
- 2 Apple omits 'warrant canary' from latest transparency reports; Patriot Act data demands likely made
- 3 Anger mounts after Facebook's 'shadow profiles' leak in bug
- 4 Registry hack enables continued updates for Windows XP
- 5 A close look at how Oracle installs deceptive software with Java updates