Articles about Security
General Wireless should be bound by RadioShack's previous promises not to sell or rent customer data collected, but the future landscape is going to change. Data is a company's primary asset.
RadioShack promised not to sell the data, and there's a past precedent for such a case.
The Kremlin wants to use smartphone technology it can trust -- by cracking open an alternative's source code.
The ethics of IT security are still evolving: one in five security professionals say they have worked for a company that covered up a data breach.
The cloud company announced on Monday it has been granted ISO 27018 certification, the world's first international standard for cloud privacy and data protection.
Servers with thousands of people's data was targeted at the university's engineering college.
Now we know the real reason why GCHQ is openly trying to recruit hackers...
Got a pile of old drives that you need to wipe before sending them to Silicon Heaven? Or do you want to wipe a drive in a computer that you are selling or giving away? Here are some tips and tricks to help you get the job done.
Opinion: Security is everyone's responsibility, not just those with the cash to upgrade.
A collection of notable security news items for the week ending May 15, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Google is known for playing hardball when it comes to firms fixing security problems -- and now the company itself is being held under the same standard. [UPDATED]
The companies say the TechNet website was being used as part of a Chinese hacking group's malware campaigns.
Nevertheless, Symantec attributed the less-than-desired results to a common fallback this quarter: the currency flux spawned by a stronger U.S. dollar.
New research shows censorship and site-blocking is not an effective method against piracy.
Some companies offer money, others offer credit -- United Airlines is handing out air miles to security experts who reveal vulnerabilities.
In almost every security incident there's some best practice that someone didn't follow. Here are six security technologies and techniques that would help in these cases.
In the era of BYOD, the less technical among us are prime targets for cybercrime attacks against your company. Learn the six top ways non-tech people get hacked.
Step-by-step instructions to help you tighten security and dramatically reduce the risk that crucial cloud services will be compromised. If you use a Microsoft or Google account, Office 365, Dropbox, Facebook, or Twitter, keep reading.
Hands-on: Buying Norton for your PC or Mac just got a lot simpler. The product has a rich set of features and the threat protection is excellent.
The new Apple software and new hardware for it have many features that could present problems for enterprises if IT doesn't prepare.
Time and again we write about security breaches that would have been prevented by two-factor authentication. What are the ways people do this in the real world?
America's biggest hacker conference is setting a new record for attendance at its 22nd annual event, at the Rio, Las Vegas, Nevada -- and its vendors reflect the event's growth.
Leading security conference Black Hat showcased its 2014 USA vendors and sponsors in its sprawling new location at Mandalay Bay, Las Vegas, Nevada.
My Amazon home page shows me how much the company knows about me and my online activities. Here we show you which privacy and security settings can help you reduce the information Amazon holds about you.
Here are six top-quality scanners that will help you clean up systems and keep them safe in the future. There are tools here for systems ranging from Windows XP to Windows 8.1.
Have you ever wondered how social networking sites seem to know so much about you and your preferences? We take the lid off how these sites gather data about your activities.
As the World Cup kicks off, we list five technology projects rolled out across the venues that will be hosting the tournament in Brazil over the next month.
SoSecurity faces a tough road to obtain funding for its top-notch SSD drive, but bigger companies may be drooling to take it over.
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
Ten attacks on corporations and individuals by hackers and governments, and all of them could have been prevented if people had followed best practices.
Although video is beginning to take up a large portion of traffic on the internet, search engines aren't yet at the stage where they can completely index and understand the content. ZDNet Australia speaks to Adobe on how to overcome these issues using metadata.
Speaking Tuesday at a Churchill Club event in Palo Alto, Calif., the country's Chief Information Officer Steven VanRoekel discusses innovation in the federal IT landscape. He says cybersecurity concerns should not be used as an excuse not to innovate.
Samsung's latest slider phone, the D500, looks a lot like its sliding predecessor, but comes in a black case with a megapixel camera and an MP3 player.
This SSL-based VPN appliance will appeal to enterprises with large numbers of remote users to manage, where the scalability and clustering facilities help it stand out from the crowd.
If you're unsure about the applications installed on your PC -- or know for a fact you've got a few bits of shady software hanging around -- then Spysweeper is a good buy, once you get past the speed issues.
Although it's beyond the means of most small businesses, InterSpect is worth consideration by larger enterprises concerned about growing internal threats to their networks.
This is an impressive big-company email security solution with top-name antivirus and anti-spam tools. But this market is very crowded, and alternatives do more for less.
Motorola's music mobile combines a full-featured handset that will appeal to a wide range of users whether they're looking for fun, functionality or the perfect mixture of both.
This is a good first attempt at a mail server security appliance, but it needs more development to challenge the longer-established vendors.
This mail server security appliance is child’s play to set up and manage, and great for companies with limited technical expertise.
The Barracuda Spam Firewall 400 does its job well, but the extensive configuration options make it somewhat complicated to manage.
Unique MailHurdle technology makes the RazorGate 100 stand out, but it's a little on the expensive side.
This appliance provides corporate-grade network protection that's both affordable and easy to live with -- a hard to beat combination for the smaller business.
Want to remain anonymous while you surf? Check out Tenebril's GhostSurf, which encrypts your Internet connection and provides some useful security-related utilities into the bargain.
Apple's newest iPod gets a makeover, adds some evolutionary upgrades, and delivers more bang for the buck. But are these changes enough to make a big splash?
ZoneAlarm Security Suite puts Norton Internet Security and McAfee Internet Security to shame with its easy-to-use features.ZoneAlarm's Security Suite is one of the best security suites we've seen.
Bargain hunters, ZoneAlarm with Antivirus is the security deal for you.Zone Labs' popular ZoneAlarm firewall, available in both free and fee versions, has always been a lone wolf in the realm of PC security.