Articles about Security
There's not much of a need to fret about mobile security given that cybercriminals still have plenty of easy marks to hit, according to Verizon's enterprise security group.
A repository of CointVault ransomware decryption keys obtained by the Dutch police from a seized server have been shared online by security company Kaspersky.
The financial hit due to cyberattacks appears to be wildly overstated. Instead of $201 per record, actual insurance claims show a cost more like 58 cents per record, according to Verizon's latest Data Breach Investigations Report.
Speak "OK Google" with this feature and you can unlock your phone or tablet. But will you? Even Google says it's not as secure as a PIN or password.
Researchers claim a flaw that's existed for two-decades even affects the yet-to-be-released Windows 10. But Microsoft downplayed the severity of the vulnerability.
Parts of the Patriot Act will sunset this June. But the more egregious spying programs are under a different authority. Lawmakers say they only know a fraction of what they should.
Servers in the Netherlands have been seized, with additional servers taken down in the US, Russia, Luxembourg, and Poland in Interpol's global operation to tackle the Simda botnet.
Hobart Airport's website remains out of operation following an online attack early on Sunday morning that saw it defaced with pro-Islamic State messages.
APT30, a Chinese government-sponsored group, has been spying on South-East Asian governments and commercial entities as well as journalists for the last decade, a new report from FireEye has claimed.
In the wake of the Paris terrorist attacks, France's intelligence agencies are pushing for greater powers. But that in turn is driving some of the country's most loyal companies away.
Three human rights and privacy groups suing the British government against mass surveillance will have their case heard by the European Court of Human Rights.
China's ruling party is ramping up the censorship battle with a powerful new weapon which hijacks traffic outside of the country.
A newly-released ransomware strain's poor coding allows victims in most cases to access their files without parting with a cent.
Zero Day Weekly: The curse of Anonabox, Apple eschews Rootpipe, Singtel acquires Trustwave, White House breach follies
A collection of notable security news items for the week ending April 10, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
The sophisticated botnet's operations have been disrupted in an international law enforcement operation.
In the era of BYOD, the less technical among us are prime targets for cybercrime attacks against your company. Learn the six top ways non-tech people get hacked.
Step-by-step instructions to help you tighten security and dramatically reduce the risk that crucial cloud services will be compromised. If you use a Microsoft or Google account, Office 365, Dropbox, Facebook, or Twitter, keep reading.
Hands-on: Buying Norton for your PC or Mac just got a lot simpler. The product has a rich set of features and the threat protection is excellent.
The new Apple software and new hardware for it have many features that could present problems for enterprises if IT doesn't prepare.
Time and again we write about security breaches that would have been prevented by two-factor authentication. What are the ways people do this in the real world?
America's biggest hacker conference is setting a new record for attendance at its 22nd annual event, at the Rio, Las Vegas, Nevada -- and its vendors reflect the event's growth.
Leading security conference Black Hat showcased its 2014 USA vendors and sponsors in its sprawling new location at Mandalay Bay, Las Vegas, Nevada.
My Amazon home page shows me how much the company knows about me and my online activities. Here we show you which privacy and security settings can help you reduce the information Amazon holds about you.
Here are six top-quality scanners that will help you clean up systems and keep them safe in the future. There are tools here for systems ranging from Windows XP to Windows 8.1.
Have you ever wondered how social networking sites seem to know so much about you and your preferences? We take the lid off how these sites gather data about your activities.
As the World Cup kicks off, we list five technology projects rolled out across the venues that will be hosting the tournament in Brazil over the next month.
SoSecurity faces a tough road to obtain funding for its top-notch SSD drive, but bigger companies may be drooling to take it over.
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
Ten attacks on corporations and individuals by hackers and governments, and all of them could have been prevented if people had followed best practices.
What are some of the best apps on the market to keep your iPhone and iPad safe, secure, and able to be located?
Although video is beginning to take up a large portion of traffic on the internet, search engines aren't yet at the stage where they can completely index and understand the content. ZDNet Australia speaks to Adobe on how to overcome these issues using metadata.
Speaking Tuesday at a Churchill Club event in Palo Alto, Calif., the country's Chief Information Officer Steven VanRoekel discusses innovation in the federal IT landscape. He says cybersecurity concerns should not be used as an excuse not to innovate.
Samsung's latest slider phone, the D500, looks a lot like its sliding predecessor, but comes in a black case with a megapixel camera and an MP3 player.
This SSL-based VPN appliance will appeal to enterprises with large numbers of remote users to manage, where the scalability and clustering facilities help it stand out from the crowd.
If you're unsure about the applications installed on your PC -- or know for a fact you've got a few bits of shady software hanging around -- then Spysweeper is a good buy, once you get past the speed issues.
Although it's beyond the means of most small businesses, InterSpect is worth consideration by larger enterprises concerned about growing internal threats to their networks.
This is an impressive big-company email security solution with top-name antivirus and anti-spam tools. But this market is very crowded, and alternatives do more for less.
Motorola's music mobile combines a full-featured handset that will appeal to a wide range of users whether they're looking for fun, functionality or the perfect mixture of both.
This is a good first attempt at a mail server security appliance, but it needs more development to challenge the longer-established vendors.
This mail server security appliance is child’s play to set up and manage, and great for companies with limited technical expertise.
The Barracuda Spam Firewall 400 does its job well, but the extensive configuration options make it somewhat complicated to manage.
Unique MailHurdle technology makes the RazorGate 100 stand out, but it's a little on the expensive side.
This appliance provides corporate-grade network protection that's both affordable and easy to live with -- a hard to beat combination for the smaller business.
Want to remain anonymous while you surf? Check out Tenebril's GhostSurf, which encrypts your Internet connection and provides some useful security-related utilities into the bargain.
Apple's newest iPod gets a makeover, adds some evolutionary upgrades, and delivers more bang for the buck. But are these changes enough to make a big splash?
ZoneAlarm Security Suite puts Norton Internet Security and McAfee Internet Security to shame with its easy-to-use features.ZoneAlarm's Security Suite is one of the best security suites we've seen.
Bargain hunters, ZoneAlarm with Antivirus is the security deal for you.Zone Labs' popular ZoneAlarm firewall, available in both free and fee versions, has always been a lone wolf in the realm of PC security.
The best of ZDNet, delivered
- 1 Election 2016: How to filter politically sanctimonious Facebook posts from your news feed
- 2 Facebook virus or account hacked? Here's how to fix it.
- 3 Four privacy settings you should enable in iOS 7 immediately
- 4 How to delete every Facebook wall post, wipe your Timeline
- 5 How to back up your Office 365 email database to your local computer