The company initially said 400,000 UK residents were at risk.
The company initially said 400,000 UK residents were at risk.
Want a pure Linux smartphone, no Android? Purism has the cash it needs to give it a try.
The company's new CyberRisk platform aims address a lack of oversight and accountability when it comes to third party vendor relationships.
The four exposed servers had no password, but contained the "keys to the kingdom."
CIO Strategies: Spending money on data security and privacy can help you business, not hinder it.
'KnockKnock' attackers hope to fly under the radar by hacking rarely-used, high-privilege accounts.
IoT has introduced new vulnerabilities that can put your network at risk. Providing users with ongoing security training--and examples that relate to their work--will help keep your data safe.
Forget queues, you will instead walk through a virtual aquarium as a security check.
The cyberattackers are using a fresh set of techniques to infiltrate the enterprise.
The minister releases a significant cyber report, with news that a defence contractor was breached. That raises many questions, but the media failed to follow up. Australia, you've got a problem.
Charging fees for data access, introducing a strong liability regime in the event of data breaches, and establishing data privacy and security standards are among the recommendations provided by banks and fintechs ahead of the impending open banking regime.
Under the national security draft legislation, the government could direct companies to store data in an ASD-certified cloud services provider and bar them from outsourcing core network operations.
The physical requirements are likely to be loosened for cyber recruits.
What would an escalation of tensions mean for the future of our relationships with Russian software companies, developers, and strategically outsourced tech talent?
A bombshell news report on Kaspersky's alleged involvement in the theft of NSA data leaves one crucial question unanswered.
Online security now as big a job as surveillance and counterterrorism, says GCHQ boss.
Weren't in Vegas for the heat and hacking? Here's what you need to know.
What are the best apps which offer strong encryption to keep out spying eyes?
There are great accessories out there to bring your Android and iOS photography to the next level.
Here are 10 easy steps to show you how to use the Tor network to mask your browsing habits.
Whether you are just paranoid or they really are out to get you, these handsets promise better security and privacy than standard phones.
The story of how Bletchley Park codebreakers decrypted top secret Nazi communications
One of the new features that Apple rolled out with iOS 9.3 is the ability to password-protect Notes you create. But it's not immediately clear how to do this. But once you know how, it's simple.
Interested in hacking and cybersecurity? Let's get started.
While cloud backups are quick and easy, if you want total control over your iPhone or iPad backups, the only way to do it is to make encrypted local backups. Here's how to do just that.
What apps, gadgets and accessories can help you protect your smartphones, tablets and laptops on the move?
Opinion: The FBI's attempt to order Apple to help them crack an iPhone has brought out the hysterical in many of us.
Here's a look at some of the devices, platforms and technology US President Barack Obama uses to carry out his day-to-day presidential duties.
Data breaches, hacks, and vulnerable software makes it easier than ever for a hacker to get access to your data. These simple steps can help mitigate it happening in the first place.
Updated: Almost every American has been affected by at least one data breach this year.
Meet some of the best security and privacy gadgets at this year's CES 2016 tech expo.
As national elections loom, questions have surfaced about the security of Germany's voting results software.
The Equifax data breach was maddening enough, says ZDNet's Larry Dignan. The company's follow-up was even more maddening and will put Equifax in the crosshairs for months to come.
MYOB said 87 percent of Australian small and medium-sized enterprises (SMEs) consider themselves safe from cyber attacks, mainly because they use antivirus software.
Don't click on that email! Find everything you need to know in this phishing guide including how to protect yourself from one of the most common forms of cyber attack.
There's no end in sight for this file-locking malware.
A cyber-espionage campaign is targeting utilities in the US and beyond.
Implemented correctly, the blockchain may provide the enterprise with more trust in their security systems.
The upcoming iOS 11 update has a password manager.
Victims are being asked to pay 0.5 bitcoin to get access to their systems back.
Advanced persistent threat group Turla is thought to be behind the malware.
The Android maker will certify devices that run authentic Google apps and use the proper security and permissions model.
An adware campaign is using social engineering to trick victims into installing malware, using a web page tailored to their browser.
Spora has become the latest form of ransomware to inflict several different forms of misery on its victims.
Redmond is using tactics that it has employed before to bring down big botnets.
Network Box combines all that’s good in a managed security service with an affordable, locally installed and monitored appliance -- a winning combination for companies with limited resources.
The main selling point of the MailFrontier Gateway Appliance is its delightfully straightforward management interface. The hardware and software are both well specified, and can provide a high level of protection against common mail-borne security threats.
The ZyWALL 35 UTM appliance combines all the basic security tools required to protect a small business network, and deploys them at the Internet gateway where they are most useful. Professional help with deployment may be required, however, and it doesn’t do away entirely with the need for desktop and server-side protection.
Norton AntiVirus 2006 improves its detection and removal of spyware and adware but lags behind the more proactive McAfee VirusScan 2006.
Check Point's Connectra 2.0 compares well on functionality and price with other enterprise-level SSL VPN solutions, with the added bonus of application and new endpoint security features.
LG's mid-range musical phone features dual colour displays and tri-band connectivity, but it lacks memory expansion options.
Simple to deploy and easy to manage, the Blue Coat Spyware Interceptor is a cost-effective way of identifying and blocking spyware infections without the need to configure and manage software on individual client PCs.
With its quick scanning and multiple tools for stopping malware before it infects your computer, Spyware Doctor is a solid spyware remover.
Pest Patrol Anti-Spyware doesn't score highly in user-friendly or speed terms, although it is a extensively documented and perfectly competent Spyware removal solution.
The Proventia M10 appliance provides impressive and comprehensive network security at a surprisingly affordable price. However, it’s not as easy to deploy and manage as some of the alternatives and, as such, may not meet all small business requirements.
An 802.11g wireless router with an integrated ADSL modem suitable for multiple PC homes and small offices.
Nokia's 6230i is an upgraded version of its classic, unpretentious 6230 with a higher quality screen, 1.3-megapixel camera and Bluetooth.
D-Link's DCS-5300G is no real match for a dedicated wired and monitored solution, but it's also nowhere near as expensive.
Samsung's latest slider phone, the D500, looks a lot like its sliding predecessor, but comes in a black case with a megapixel camera and an MP3 player.
This SSL-based VPN appliance will appeal to enterprises with large numbers of remote users to manage, where the scalability and clustering facilities help it stand out from the crowd.