Security basics are your best bet.
Security basics are your best bet.
The funding will be used to grow Cybereason's product line and teams, as well as to boost its presence in the EMEA and APAC regions.
The hundred-plus security experts say many US states are "inadequately prepared" to deal with the rising cybersecurity risks of state and federal elections.
But Microsoft rebuts claims that it's been using underhand tactics in Windows 10 against third-party antivirus.
Users only needed to visit a website compromised with a malicious advert to become infected with Mole ransomware, warn security researchers.
The malware sends premium rate messages through Android devices to plunder your bank account.
Respondents to a recent Tech Pro Research survey were optimistic about cybersecurity within their organizations. This infographic and research report contain more details.
The independent body tasked with establishing industry standards around data has released a draft Code of Practice in a bid to set benchmarks for the responsible use of data.
McAfee Labs report says 244 new threats are detected every minute - and that Android is the target in a boom in ransomware attacks.
ProtonMail says its VPN will protect privacy online and will not abuse user trust as Facebook and Google allegedly do in order to sell ads.
How does 'next-generation' antivirus software improve on the traditional variety? How can the IoT be made more secure? These are just some of the questions we put to Carbon Black's Patrick Morley.
A report from Big Blue has said the total average cost spent by a company in Australia as a result of a data breach is AU$2.51 million.
Home deliveries are being canceled at random or delayed, and customers are not happy.
The serious chain of bugs can be used to compromise Linux, FreeBSD, OpenBSD, and Solaris.
Web hosting company Internet Nayana is paying a hacker 1.3 billion won in bitcoin after its servers were hijacked by a ransomware attack.
The blockchain system would provide refugees with the ability to present their IDs via an app on their smartphones when required to access basic services such as education and healthcare.
Interested in hacking and cybersecurity? Let's get started.
While cloud backups are quick and easy, if you want total control over your iPhone or iPad backups, the only way to do it is to make encrypted local backups. Here's how to do just that.
What apps, gadgets and accessories can help you protect your smartphones, tablets and laptops on the move?
Opinion: The FBI's attempt to order Apple to help them crack an iPhone has brought out the hysterical in many of us.
Here's a look at some of the devices, platforms and technology US President Barack Obama uses to carry out his day-to-day presidential duties.
Data breaches, hacks, and vulnerable software makes it easier than ever for a hacker to get access to your data. These simple steps can help mitigate it happening in the first place.
Updated: Almost every American has been affected by at least one data breach this year.
Meet some of the best security and privacy gadgets at this year's CES 2016 tech expo.
A look back at the hot topics, major deals, and the technological breakthroughs of the year -- from security to product launches, and the year's successes and catastrophes.
Updated: Before you do anything on your new iPhone or iPad, you should lock it down. Here are the important tweaks you need to protect your privacy.
Buying on a budget? These gadgets are the very best on the market for their price.
As Brazilian consumers seek Black Friday offers online, many are putting their information at risk, according to research. We look at some of the risky behaviors of ecommerce users in Brazil.
ZDNet presents the worst tech products and services, embarrassing decisions, and other screw-ups of the year.
The latest BlackBerry phone lands with two flagship features: Android, and a physical keyboard.
This tough tablet can be bumped, scraped, and dropped, and even survive spills and dust. It's also secure through-and-through, with a trusted secure module chip and a fingerprint reader.
IBM X-Force researchers warn that this sophisticated malware family is fast becoming one of the most prevalent forms of data-stealing banking Trojans
EZ-Link and Nets are among a handful of partners Singapore's three mobile carriers have roped in to support the GSMA authentication standard, allowing users to access services via their mobile number, but details on local implementation will be available only when services go live later this year.
Researchers know what the botnet is capable of - but they don't seem to know what it'll actually do.
NTT Security's latest Global Threat Intelligence Report measured a 12-month period and found that 86 percent of attacks on Australia come from within the country's own borders.
Malware hidden within guides for popular games, including Pokémon GO and FIFA, repeatedly slipped through Google Play security defences.
The sophisticated attackers are putting more and more pressure on the military, governments, celebrities, and media worldwide.
Windows' system files were flagged as malicious, and Facebook was marked as a phishing site.
The fingerprint reader aims to target in-store fraud by reducing the need of PIN codes and signatures.
A cyberattack could cost an organization millions, but an employee within your company might be willing to give an outsider access to sensitive information via their login credentials for under £200.
With printers often on the same network as secured devices, HP is concerned about the lack of security controls organisations are placing on them, saying it opens an opportunity for malicious activity to take place.
Move over Locky; there's a new king of ransomware...
Android Nougat will protect you from common ransomware tactics, says Google. But, for now, only three percent of users enjoy its protection.
The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.
The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.
Check Point's Connectra 2.0 compares well on functionality and price with other enterprise-level SSL VPN solutions, with the added bonus of application and new endpoint security features.
LG's mid-range musical phone features dual colour displays and tri-band connectivity, but it lacks memory expansion options.
Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.
With its quick scanning and multiple tools for stopping malware before it infects your computer, Spyware Doctor is a solid spyware remover.
Pest Patrol Anti-Spyware doesn't score highly in user-friendly or speed terms, although it is a extensively documented and perfectly competent Spyware removal solution.
The Proventia M10 appliance provides impressive and comprehensive network security at a surprisingly affordable price. However, it’s not as easy to deploy and manage as some of the alternatives and, as such, may not meet all small business requirements.
An 802.11g wireless router with an integrated ADSL modem suitable for multiple PC homes and small offices.
Nokia's 6230i is an upgraded version of its classic, unpretentious 6230 with a higher quality screen, 1.3-megapixel camera and Bluetooth.
D-Link's DCS-5300G is no real match for a dedicated wired and monitored solution, but it's also nowhere near as expensive.
Samsung's latest slider phone, the D500, looks a lot like its sliding predecessor, but comes in a black case with a megapixel camera and an MP3 player.
This SSL-based VPN appliance will appeal to enterprises with large numbers of remote users to manage, where the scalability and clustering facilities help it stand out from the crowd.
If you're unsure about the applications installed on your PC -- or know for a fact you've got a few bits of shady software hanging around -- then Spysweeper is a good buy, once you get past the speed issues.