Articles about Security
Australian Communications Minister Malcolm Turnbull has said that the vast majority of metadata queries used by police are to determine who the account holder of a phone is.
The video game streaming site, bought by Amazon for almost $970 million, has reset user passwords amid concerns it may have been hacked.
Even if a crucial and controversial legal authority expires later this year, the US government will still be able to collect billions of domestic call records on Americans.
Although Edward Snowden revealed many of the NSA's clandestine activities, Ron Wyden remains one of the only hopes of US intelligence reform from within Congress.
The FBI is investigating whether the data has stemmed from public records or cyberattack.
Security awareness emails are critical to a good IT communication plan. Here's a look at what they should cover and how to entice users to read them, along with four templates to get you started.
from TechProResearch »
Every major web browser showed up, every web browser got hacked.
Known vulnerability CVE-2011-2461, despite being patched, remains a threat to today's websites which host exploitable Flash movies.
The firm plans to use the funds to develop enterprise solutions to defend against APTs.
ASIC chairman Greg Medcraft has revealed that the regulator is planning to launch an innovation hub in the upcoming financial year to help startups navigate Australia's regulatory landscape.
The New South Wales Electoral Commission has scrambled to patch security flaws in the electronic voting system that could lead to compromised votes, just one week out from the state election.
New Zealand was spying on candidates from Brazil, Indonesia, Mexico, and five other countries vying to lead the World Trade Organisation.
New EY report warns that with IoT, 'finding loopholes to enter any network will be easier for any attacker since there will be so many ways to attack.'
The House Judiciary Committee, chaired by one of the sponsors of SOPA, shows its complete disregard for both good taste and copyright in a shocking display of GIF overload.
The country has finally admitted to the existence of units dedicated to cyber warfare.
A collection of notable security news items for the week ending March 20, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Hands-on: Buying Norton for your PC or Mac just got a lot simpler. The product has a rich set of features and the threat protection is excellent.
Time and again we write about security breaches that would have been prevented by two-factor authentication. What are the ways people do this in the real world?
America's biggest hacker conference is setting a new record for attendance at its 22nd annual event, at the Rio, Las Vegas, Nevada -- and its vendors reflect the event's growth.
Leading security conference Black Hat showcased its 2014 USA vendors and sponsors in its sprawling new location at Mandalay Bay, Las Vegas, Nevada.
My Amazon home page shows me how much the company knows about me and my online activities. Here we show you which privacy and security settings can help you reduce the information Amazon holds about you.
Here are six top-quality scanners that will help you clean up systems and keep them safe in the future. There are tools here for systems ranging from Windows XP to Windows 8.1.
As the World Cup kicks off, we list five technology projects rolled out across the venues that will be hosting the tournament in Brazil over the next month.
SoSecurity faces a tough road to obtain funding for its top-notch SSD drive, but bigger companies may be drooling to take it over.
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
Ten attacks on corporations and individuals by hackers and governments, and all of them could have been prevented if people had followed best practices.
What are some of the best apps on the market to keep your iPhone and iPad safe, secure, and able to be located?
If you have just one password for everything it's easy to remember, but we all know that isn't safe. So how do you keep track of a large number of them - and not have to worry about it?
Behind on the news and hungry for more? Here's what we learned this week — including which city is doing more for tech than Silicon Valley, and Samsung's biggest ally.
There have been some pretty bad vulnerabilities before Heartbleed. Is it really any more severe than CodeRed or Blaster?
If you're late to upgrade or have decided not to change your operating system, check out these tips to keep the system as secure as possible.
Although video is beginning to take up a large portion of traffic on the internet, search engines aren't yet at the stage where they can completely index and understand the content. ZDNet Australia speaks to Adobe on how to overcome these issues using metadata.
Speaking Tuesday at a Churchill Club event in Palo Alto, Calif., the country's Chief Information Officer Steven VanRoekel discusses innovation in the federal IT landscape. He says cybersecurity concerns should not be used as an excuse not to innovate.
Governments worldwide are investing in cyber armies and intelligence to counter growing online threats.
This is a good first attempt at a mail server security appliance, but it needs more development to challenge the longer-established vendors.
The Barracuda Spam Firewall 400 does its job well, but the extensive configuration options make it somewhat complicated to manage.
Unique MailHurdle technology makes the RazorGate 100 stand out, but it's a little on the expensive side.
This mail server security appliance is child’s play to set up and manage, and great for companies with limited technical expertise.
This appliance provides corporate-grade network protection that's both affordable and easy to live with -- a hard to beat combination for the smaller business.
Want to remain anonymous while you surf? Check out Tenebril's GhostSurf, which encrypts your Internet connection and provides some useful security-related utilities into the bargain.
ZoneAlarm Security Suite puts Norton Internet Security and McAfee Internet Security to shame with its easy-to-use features.ZoneAlarm's Security Suite is one of the best security suites we've seen.
Bargain hunters, ZoneAlarm with Antivirus is the security deal for you.Zone Labs' popular ZoneAlarm firewall, available in both free and fee versions, has always been a lone wolf in the realm of PC security.
McAfee AntiSpyware's automated spyware scanning makes this a sensible addition to any PC's security measures.McAfee AntiSpyware is a solid entry in the spyware-removal category.
This richly-featured gateway and firewall allows IT managers in small/medium-sized businesses to secure their networks easily.
This sleek and very thin Sony is good for on-the-go snapshots, but its photo quality is average.With a depth of only 8/10 of an inch, the Sony Cyber Shot DSC-T1 is one of the slimmest digital cameras we've seen.
ZoneAlarm Pro 4.0 is a great firewall for security novices, but you'll still need a separate anti-virus program.
This innovative solution provides a bridge between outsourced and in-house network security, and could appeal to many an SME.
Spybot blows the venerable Ad-aware out of the water when it comes to protecting you against ad-serving software.
PC Immobiliser is a simple device that should increase the security of any PC or notebook, and make it less attractive to thieves. The use of iButtons to restrict access to anyone who doesn’t have the correct token works seamlessly once set up.