Articles about Security
The Guardians of Peace must be delighted -- Sony has withdrawn plans to release 'The Interview' in any form.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
The most recent developments in the Sony cyber attack spur one key question: Now what?
Hangouts announces a new feature. Is your privacy protected?
UPDATED: Stateside, AT&T and Verizon are on deck to sell the Classic in 2015.
An emailed threat can send companies to their knees and propel individuals without so much as a parking ticket straight to a holding cell. The problem is, today's puffed-up chest hacktivists know it, and Sony has borne the brunt. [Analysis]
E-mail credentials and a key DNS zone system were compromised. The severity of the damage is not yet clear.
Non-HTTPS pages provide no data security and the user should be reminded of that, argues the company. It's a big step.
Tackling state-sponsored attacks on critical infrastructure and the defence supply chain remain top priorities, according to newly published figures.
New Zealand security software company Wynyard Group is facing an annual revenue result that will fall below its forecast NZ$29 million, due to lagging customer negotiations.
Although the man involved in a fatal siege in Sydney on Monday was well known to police and out on bail, Prime Minister Tony Abbott has said that retaining every Australians' telecommunications data for two years may have helped police in the incident.
Mobile ransomware, insurance claims and striking the supply chain are all expected to make an appearance in 2015.
The crew behind The Pirate Bay has opened up about what the future holds for the torrent search website.
The chair of the joint committee on intelligence and security, Dan Tehan, has said that Monday's gunman incident in Sydney has reinforced the need for increased police powers and intelligence surveillance.
Google has blacklisted over 11,000 domains after a malware campaign, dubbed SoakSoak, compromised more than 100,000 websites using the WordPress content management system.
There have been some pretty bad vulnerabilities before Heartbleed. Is it really any more severe than CodeRed or Blaster?
If you're late to upgrade or have decided not to change your operating system, check out these tips to keep the system as secure as possible.
This high tech, hurricane-resistant and ultra-secure facility in Fort Lauderdale is where Florida's elite store their exotic cars, precious valuables, works of art and wine collections.
Employees are prime targets for cybercrime attacks against your company. Find out the six top ways criminals gain access to your valuable data, IP, and more.
A wargame aimed at finding hidden cyber-security talent took place in Winston Churchill's wartime bunker.
Maintaining privacy online seems almost impossible, but there are a tools that can minimise the chances of your personal, financial or business data falling into the wrong hands.
What are some simple tips, tricks and best-practice methods of keeping yourself and your digital identity safe from hackers?
Behind on the news and hungry for more? Here's what we learned this week — from tweets leading to bank hacks, Windows XP lives, and who is the elusive Bitcoin inventor?
There are many reasons why users will be sticking with Windows XP after Microsoft ends all support next month. In the final analysis, none of them are good excuses.
Behind on the news and hungry for more? Here's what we learned this week — from webcam hacking, net neutrality, and all the things that are cheaper to buy than WhatsApp.
At informal infosec conference Security B-Sides SF, former Black Hat General Manager and current Global Strategist for Rapid7 Trey Ford outlined the gaps between hacking and legislation in America.
From snow cannons to deep-packet network inspection and aerial drones, here's some of the gadgets and technologies powering the Sochi 2014 Olympic Games.
Researchers shared their discovery and research on espionage malware "The Mask" (aka Careto) at the Kaspersky Labs security summit this week. ZDNet took photos of the presentation.
Exploring this Debian GNU/Linux derivative that is tightly focused on security analysis and penetration testing - and it comes with a mind-boggling array of utilities for that pupose.
Infamous security researcher Felix "FX" Lindner exposed Lawful Interception surveillance systems as easy to detect, derail, and maliciously exploit at European hacking conference 30c3.
Although video is beginning to take up a large portion of traffic on the internet, search engines aren't yet at the stage where they can completely index and understand the content. ZDNet Australia speaks to Adobe on how to overcome these issues using metadata.
Speaking Tuesday at a Churchill Club event in Palo Alto, Calif., the country's Chief Information Officer Steven VanRoekel discusses innovation in the federal IT landscape. He says cybersecurity concerns should not be used as an excuse not to innovate.
Governments worldwide are investing in cyber armies and intelligence to counter growing online threats.
At the WWDC conference in San Francisco, Apple CEO Steve Jobs unveils iTunes Match, part of the company's new iCloud service. For a $24.99 annual fee, users can use iTunes Match to scan their music library for non-iTunes purchased songs. Apple then provides a DRM-free file of those songs for access from iCloud.
This is a good first attempt at a mail server security appliance, but it needs more development to challenge the longer-established vendors.
This mail server security appliance is child’s play to set up and manage, and great for companies with limited technical expertise.
Unique MailHurdle technology makes the RazorGate 100 stand out, but it's a little on the expensive side.
The Barracuda Spam Firewall 400 does its job well, but the extensive configuration options make it somewhat complicated to manage.
This appliance provides corporate-grade network protection that's both affordable and easy to live with -- a hard to beat combination for the smaller business.
Want to remain anonymous while you surf? Check out Tenebril's GhostSurf, which encrypts your Internet connection and provides some useful security-related utilities into the bargain.
ZoneAlarm Security Suite puts Norton Internet Security and McAfee Internet Security to shame with its easy-to-use features.ZoneAlarm's Security Suite is one of the best security suites we've seen.
Bargain hunters, ZoneAlarm with Antivirus is the security deal for you.Zone Labs' popular ZoneAlarm firewall, available in both free and fee versions, has always been a lone wolf in the realm of PC security.
McAfee AntiSpyware's automated spyware scanning makes this a sensible addition to any PC's security measures.McAfee AntiSpyware is a solid entry in the spyware-removal category.
This richly-featured gateway and firewall allows IT managers in small/medium-sized businesses to secure their networks easily.
This sleek and very thin Sony is good for on-the-go snapshots, but its photo quality is average.With a depth of only 8/10 of an inch, the Sony Cyber Shot DSC-T1 is one of the slimmest digital cameras we've seen.
ZoneAlarm Pro 4.0 is a great firewall for security novices, but you'll still need a separate anti-virus program.
This innovative solution provides a bridge between outsourced and in-house network security, and could appeal to many an SME.
Spybot blows the venerable Ad-aware out of the water when it comes to protecting you against ad-serving software.
PC Immobiliser is a simple device that should increase the security of any PC or notebook, and make it less attractive to thieves. The use of iButtons to restrict access to anyone who doesn’t have the correct token works seamlessly once set up.