Articles about Security
Lenovo is still smarting from the Superfish media storm, but CTO Peter Hortensius says the firm is working to fix its battered reputation.
Visa has introduced tokenisation in Australia as a step to reduce credit card fraud when payments are made online or via mobile devices.
Class-action suit stemming from 2012 incident could net each plaintiff up to $50
The former NSA contractor turned whistleblower said during a Reddit question-and-answer session that the leaks have also improved security and encryption in Silicon Valley.
An HP report highlights how the bulk of exploits in 2014 revolved around vulnerabilities that were discovered before 2013.
Superfish isn't just adware -- it can also be a nightmare for those who value their privacy.
Company investigates claim of hacking attack by NSA and GCHQ.
Telstra, Optus, and Vodafone have all confirmed they use SIMs produced by Dutch SIM card maker Gemalto, the company that the latest leaks from Edward Snowden claim was hacked by US and British spies.
Problems still plague exchanging information amongst Australia's counter-terrorism authorities, the government's review of counter-terrorism arrangements has said.
Policymaking should be about evidence-based improvement, not just leaving swathes of destruction around you. Yet, as the Coalition tries to ramrod data retention into existence, the real costs of policy self-obsession are once again becoming clear.
New technologies are moving us away from easy-to-guess passwords, but we still need to be careful about how we use fingerprints and other biometrics.
Lenovo has apologised for preloading Superfish adware on its consumer line of laptops that compromised the security of the devices, and released a tool to remove it.
Microsoft focused on adopting FIDO 2.0 standard for strong authentication, but Windows 10 and everyone else will have to wait for spec's completion
That was fast. Roughly 24 hours after news emerged that an unknown number of Lenovo PCs were infected with potentially dangerous software, Microsoft released a tool that automatically removes the offending code. [Updated]
Zero Day Weekly: Lenovo's poison Superfish, Netgear vuln, SIM card spying, Obama's encryption follies
A collection of notable security news items for the week ending February 20, 2015. Covers enterprise, controversies, application and mobile security, malware, reports and more.
Here are six top-quality scanners that will help you clean up systems and keep them safe in the future. There are tools here for systems ranging from Windows XP to Windows 8.1.
As the World Cup kicks off, we list five technology projects rolled out across the venues that will be hosting the tournament in Brazil over the next month.
SoSecurity faces a tough road to obtain funding for its top-notch SSD drive, but bigger companies may be drooling to take it over.
Those who want maximum privacy for their email have a tough time using difficult software. Google is attempting to do better with Gmail, but there's already a decent webmail solution.
Ten attacks on corporations and individuals by hackers and governments, and all of them could have been prevented if people had followed best practices.
What are some of the best apps on the market to keep your iPhone and iPad safe, secure, and able to be located?
If you have just one password for everything it's easy to remember, but we all know that isn't safe. So how do you keep track of a large number of them - and not have to worry about it?
Behind on the news and hungry for more? Here's what we learned this week — including which city is doing more for tech than Silicon Valley, and Samsung's biggest ally.
There have been some pretty bad vulnerabilities before Heartbleed. Is it really any more severe than CodeRed or Blaster?
If you're late to upgrade or have decided not to change your operating system, check out these tips to keep the system as secure as possible.
This high tech, hurricane-resistant and ultra-secure facility in Fort Lauderdale is where Florida's elite store their exotic cars, precious valuables, works of art and wine collections.
Employees are prime targets for cybercrime attacks against your company. Find out the six top ways criminals gain access to your valuable data, IP, and more.
A wargame aimed at finding hidden cyber-security talent took place in Winston Churchill's wartime bunker.
Maintaining privacy online seems almost impossible, but there are a tools that can minimise the chances of your personal, financial or business data falling into the wrong hands.
What are some simple tips, tricks and best-practice methods of keeping yourself and your digital identity safe from hackers?
Although video is beginning to take up a large portion of traffic on the internet, search engines aren't yet at the stage where they can completely index and understand the content. ZDNet Australia speaks to Adobe on how to overcome these issues using metadata.
Speaking Tuesday at a Churchill Club event in Palo Alto, Calif., the country's Chief Information Officer Steven VanRoekel discusses innovation in the federal IT landscape. He says cybersecurity concerns should not be used as an excuse not to innovate.
Governments worldwide are investing in cyber armies and intelligence to counter growing online threats.
This is a good first attempt at a mail server security appliance, but it needs more development to challenge the longer-established vendors.
Unique MailHurdle technology makes the RazorGate 100 stand out, but it's a little on the expensive side.
This mail server security appliance is child’s play to set up and manage, and great for companies with limited technical expertise.
The Barracuda Spam Firewall 400 does its job well, but the extensive configuration options make it somewhat complicated to manage.
This appliance provides corporate-grade network protection that's both affordable and easy to live with -- a hard to beat combination for the smaller business.
Want to remain anonymous while you surf? Check out Tenebril's GhostSurf, which encrypts your Internet connection and provides some useful security-related utilities into the bargain.
ZoneAlarm Security Suite puts Norton Internet Security and McAfee Internet Security to shame with its easy-to-use features.ZoneAlarm's Security Suite is one of the best security suites we've seen.
Bargain hunters, ZoneAlarm with Antivirus is the security deal for you.Zone Labs' popular ZoneAlarm firewall, available in both free and fee versions, has always been a lone wolf in the realm of PC security.
McAfee AntiSpyware's automated spyware scanning makes this a sensible addition to any PC's security measures.McAfee AntiSpyware is a solid entry in the spyware-removal category.
This richly-featured gateway and firewall allows IT managers in small/medium-sized businesses to secure their networks easily.
This sleek and very thin Sony is good for on-the-go snapshots, but its photo quality is average.With a depth of only 8/10 of an inch, the Sony Cyber Shot DSC-T1 is one of the slimmest digital cameras we've seen.
ZoneAlarm Pro 4.0 is a great firewall for security novices, but you'll still need a separate anti-virus program.
This innovative solution provides a bridge between outsourced and in-house network security, and could appeal to many an SME.
Spybot blows the venerable Ad-aware out of the water when it comes to protecting you against ad-serving software.
PC Immobiliser is a simple device that should increase the security of any PC or notebook, and make it less attractive to thieves. The use of iButtons to restrict access to anyone who doesn’t have the correct token works seamlessly once set up.