The NSA used the Windows hacking tools to target several banks.
The NSA used the Windows hacking tools to target several banks.
The software giant is no longer prohibited from keeping the classified national security letter a secret.
A former Homeland Security official said the spike in device searches was a "conscious strategy" to use a loophole that allows agents to search devices at the border without a warrant.
They may sound like a German noble family, but STIX and TAXII are new tools for fighting internet lawlessness. They enable the good guys to beat internet attacks through automated, realtime info sharing, and are supported by many tech heavyweights. Here's what you need to know.
Move over Locky; there's a new king of ransomware...
Melbourne IT has said its DNS outage on Thursday was the result of a large distributed denial-of-service attack.
With security touted as being everybody's responsibility, Trend Micro's Global VP of cloud security Mark Nunnikhoven believes security teams need to start acting in a manner complementary to that.
After an unknown hacker targeted the city of Dallas' emergency siren system, other cities may be vulnerable.
If media outlets, individual reporters, or simple watchers take the volume of open web or deep web chatter after terror attacks as evidence, then they will fall victim to bots and trolls -- and ultimately mislead their networks.
Researchers believe that the several attackers obtained the exploit from the same, original source.
A10's cloud-native controller will become the analytics and orchestration engine for the company's entire product line, and also includes useful support for open-source load balancers.
New report by MPs 'does not rule out the possibility' that foreign actors worked to take down the EU Referendum vote registration site -- but government and cybersecurity experts disagree.
A new 'multi-stakeholder forum', to be established by July, will oversee Australia's open government work plan, with commitments already set through to 2018.
California-based Synack will be using the investment from companies such as Microsoft, HPE, and Singtel to bring its crowdsourced bug hunting platform to the Asia-Pacific region.
The personal information associated with parents' submissions on proposed regulations for Victorian schools was accidentally published online by the state's education department, it has been revealed.
Data breaches, hacks, and vulnerable software makes it easier than ever for a hacker to get access to your data. These simple steps can help mitigate it happening in the first place.
Updated: Almost every American has been affected by at least one data breach this year.
Meet some of the best security and privacy gadgets at this year's CES 2016 tech expo.
A look back at the hot topics, major deals, and the technological breakthroughs of the year -- from security to product launches, and the year's successes and catastrophes.
Updated: Before you do anything on your new iPhone or iPad, you should lock it down. Here are the important tweaks you need to protect your privacy.
Buying on a budget? These gadgets are the very best on the market for their price.
As Brazilian consumers seek Black Friday offers online, many are putting their information at risk, according to research. We look at some of the risky behaviors of ecommerce users in Brazil.
ZDNet presents the worst tech products and services, embarrassing decisions, and other screw-ups of the year.
The latest BlackBerry phone lands with two flagship features: Android, and a physical keyboard.
This tough tablet can be bumped, scraped, and dropped, and even survive spills and dust. It's also secure through-and-through, with a trusted secure module chip and a fingerprint reader.
ZDNet provides a number of tips to protect the IoT devices installed in your smart home.
A basic guide to the Internet's underbelly -- the Dark Web.
There are a number of quick and easy ways to improve your personal privacy and safety when using public Internet services.
Privacy and anonymity are now paramount online -- so what do you need to know about one tool available, VPNs, to stay safe?
The security-focused phone gets a long-awaited refresh, with a brand new phablet-sized design and new privacy features.
A university found its own network turned against it -- as refrigerators and lights overwhelmed it with searches for seafood.
The malware, developed during a hackathon between British and American spies, turns ordinary smart TVs into listening devices.
The new wiper malware is joining Shamoon in attacks against the Middle East and Europe.
Even after they've been removed from the app store, rogue apps can still be causing hassles for the people who downloaded them.
Microsoft wants security researchers to switch more of their efforts to core applications in Office 365.
Terrorists may be turning to drones, but France has found a solution in the natural world.
Symantec says the new venture arm will push startups to get their products to market more quickly.
TSA documents reveal how a New York airport's security screeners failed to check names against the government's "no-fly" list.
Webcams, medical devices, routers, and databases are only some of the devices on show.
Don't pick up the phone. They're only after money — and things get nasty when they don't get paid.
HP Enterprise unveiled a new service at RSA 2017 that can protect data-at-rest, data-in-motion, and data-in-memory. We spoke with HPE about how its greatest value will be in IoT.
The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.
Check Point's Connectra 2.0 compares well on functionality and price with other enterprise-level SSL VPN solutions, with the added bonus of application and new endpoint security features.
LG's mid-range musical phone features dual colour displays and tri-band connectivity, but it lacks memory expansion options.
Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.
With its quick scanning and multiple tools for stopping malware before it infects your computer, Spyware Doctor is a solid spyware remover.
Pest Patrol Anti-Spyware doesn't score highly in user-friendly or speed terms, although it is a extensively documented and perfectly competent Spyware removal solution.
The Proventia M10 appliance provides impressive and comprehensive network security at a surprisingly affordable price. However, it’s not as easy to deploy and manage as some of the alternatives and, as such, may not meet all small business requirements.
An 802.11g wireless router with an integrated ADSL modem suitable for multiple PC homes and small offices.
Nokia's 6230i is an upgraded version of its classic, unpretentious 6230 with a higher quality screen, 1.3-megapixel camera and Bluetooth.
D-Link's DCS-5300G is no real match for a dedicated wired and monitored solution, but it's also nowhere near as expensive.
Samsung's latest slider phone, the D500, looks a lot like its sliding predecessor, but comes in a black case with a megapixel camera and an MP3 player.
This SSL-based VPN appliance will appeal to enterprises with large numbers of remote users to manage, where the scalability and clustering facilities help it stand out from the crowd.
If you're unsure about the applications installed on your PC -- or know for a fact you've got a few bits of shady software hanging around -- then Spysweeper is a good buy, once you get past the speed issues.
Although it's beyond the means of most small businesses, InterSpect is worth consideration by larger enterprises concerned about growing internal threats to their networks.