Articles about Security
Recently discovered vulnerabilities are being used by the Russian APT28 group to spy on government targets and steal politically sensitive data.
Our handpicked list of compelling RSA 2015 sessions will help you find the cybersecurity signal above the conference noise.
Raytheon is expected to announce plans to acquire Websense in order to bring government security solutions into the enterprise.
An international agreement on internet security would be premature despite the need for a trans-border agreement to help minimise the potential damage done by state-sponsored online activity, according to Australian Foreign Minister Julie Bishop.
The problem isn't the VPN; it's trying to maintain anti-competitive, territory-by-territory content licensing models on the global digital distribution platform.
Twitter has announced that from May 18, all of its non-American user data will be handled under Irish law.
Already making an impact with its cloud backup service, Revert plans to push into cloud data security.
Amid growing interest in hybrid clouds, enterprises need to pay attention to service accountability, which can be tricky to define in an environment intertwined with assets belonging to the customer and cloud provider.
A security researcher joked about hacking a plane and was picked up by the FBI. They didn't think it was one bit funny.
Leading security experts say they can already share cybersecurity information without compromising privacy law.
Twitter's general counsel said in a Washington Post editorial: "Open discussion doesn't mean much if some people are afraid to take part."
Zero Day Weekly: Active Microsoft zero-day, Oracle kills Java, D-Link snafu, more DHS cyber-negligence
A collection of notable security news items for the week ending April 17, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Google has firmed up its support deadline for Chrome on Windows XP with the last security update set for the end of the year.
Another annual dollop of delicious data shows that despite all the trendy new twists and exotic malware threats, we're still getting the security basics wrong.
Australia's Tier-3 is launching its Huntsman Security operation in the United States, backed by a $10 million investment injection from the Sydney-based IT security company.
In almost every security incident there's some best practice that someone didn't follow. Here are six security technologies and techniques that would help in these cases.
In the era of BYOD, the less technical among us are prime targets for cybercrime attacks against your company. Learn the six top ways non-tech people get hacked.
Step-by-step instructions to help you tighten security and dramatically reduce the risk that crucial cloud services will be compromised. If you use a Microsoft or Google account, Office 365, Dropbox, Facebook, or Twitter, keep reading.
Hands-on: Buying Norton for your PC or Mac just got a lot simpler. The product has a rich set of features and the threat protection is excellent.
The new Apple software and new hardware for it have many features that could present problems for enterprises if IT doesn't prepare.
Time and again we write about security breaches that would have been prevented by two-factor authentication. What are the ways people do this in the real world?
America's biggest hacker conference is setting a new record for attendance at its 22nd annual event, at the Rio, Las Vegas, Nevada -- and its vendors reflect the event's growth.
Leading security conference Black Hat showcased its 2014 USA vendors and sponsors in its sprawling new location at Mandalay Bay, Las Vegas, Nevada.
My Amazon home page shows me how much the company knows about me and my online activities. Here we show you which privacy and security settings can help you reduce the information Amazon holds about you.
Here are six top-quality scanners that will help you clean up systems and keep them safe in the future. There are tools here for systems ranging from Windows XP to Windows 8.1.
Have you ever wondered how social networking sites seem to know so much about you and your preferences? We take the lid off how these sites gather data about your activities.
As the World Cup kicks off, we list five technology projects rolled out across the venues that will be hosting the tournament in Brazil over the next month.
SoSecurity faces a tough road to obtain funding for its top-notch SSD drive, but bigger companies may be drooling to take it over.
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
Ten attacks on corporations and individuals by hackers and governments, and all of them could have been prevented if people had followed best practices.
Although video is beginning to take up a large portion of traffic on the internet, search engines aren't yet at the stage where they can completely index and understand the content. ZDNet Australia speaks to Adobe on how to overcome these issues using metadata.
Speaking Tuesday at a Churchill Club event in Palo Alto, Calif., the country's Chief Information Officer Steven VanRoekel discusses innovation in the federal IT landscape. He says cybersecurity concerns should not be used as an excuse not to innovate.
Samsung's latest slider phone, the D500, looks a lot like its sliding predecessor, but comes in a black case with a megapixel camera and an MP3 player.
This SSL-based VPN appliance will appeal to enterprises with large numbers of remote users to manage, where the scalability and clustering facilities help it stand out from the crowd.
If you're unsure about the applications installed on your PC -- or know for a fact you've got a few bits of shady software hanging around -- then Spysweeper is a good buy, once you get past the speed issues.
Although it's beyond the means of most small businesses, InterSpect is worth consideration by larger enterprises concerned about growing internal threats to their networks.
This is an impressive big-company email security solution with top-name antivirus and anti-spam tools. But this market is very crowded, and alternatives do more for less.
Motorola's music mobile combines a full-featured handset that will appeal to a wide range of users whether they're looking for fun, functionality or the perfect mixture of both.
This is a good first attempt at a mail server security appliance, but it needs more development to challenge the longer-established vendors.
The Barracuda Spam Firewall 400 does its job well, but the extensive configuration options make it somewhat complicated to manage.
This mail server security appliance is child’s play to set up and manage, and great for companies with limited technical expertise.
Unique MailHurdle technology makes the RazorGate 100 stand out, but it's a little on the expensive side.
This appliance provides corporate-grade network protection that's both affordable and easy to live with -- a hard to beat combination for the smaller business.
Want to remain anonymous while you surf? Check out Tenebril's GhostSurf, which encrypts your Internet connection and provides some useful security-related utilities into the bargain.
Apple's newest iPod gets a makeover, adds some evolutionary upgrades, and delivers more bang for the buck. But are these changes enough to make a big splash?
ZoneAlarm Security Suite puts Norton Internet Security and McAfee Internet Security to shame with its easy-to-use features.ZoneAlarm's Security Suite is one of the best security suites we've seen.
Bargain hunters, ZoneAlarm with Antivirus is the security deal for you.Zone Labs' popular ZoneAlarm firewall, available in both free and fee versions, has always been a lone wolf in the realm of PC security.
The best of ZDNet, delivered
- 1 Registry hack enables continued updates for Windows XP
- 2 Election 2016: How to filter politically sanctimonious Facebook posts from your news feed
- 3 Four privacy settings you should enable in iOS 7 immediately
- 4 How to delete every Facebook wall post, wipe your Timeline
- 5 Facebook virus or account hacked? Here's how to fix it.