Articles about Security
[UPDATED] We have had an absolute deluge of problem updates from Redmond recently and some have been serious. What's up at Microsoft?
The tragic story of pioneering computer scientist Alan Turing makes for an interesting and enjoyable movie, but many personal and technological details are glossed over in this treatment.
The group taking responsibility for the Sony hack have promised to give the firm a Christmas present it won't forgot -- unless staff ask politely for documents to be kept secret.
Apart from IT infrastructure resources consolidation and security enhancements, Asian businesses will also be spending on IT-enabled innovation, social apps, and data analytics, reveals IDC survey.
One of several updates for various versions of Exchange Server released Tuesday, the Exchange Server 2010 SP3 Update Rollup 8, was pulled Wednesday and reissued Friday.
October updates to Office 2010 and 2013 could cause problems with field updates in Microsoft Word. The faulty update is unclear at this point.
Number of attacks peaks driven by attempts to steal money online during the World Cup.
New rules will stop apps from interfering with user control of extensions and settings in all browsers. Other products do this, but Microsoft now makes it a baseline protection.
Trying to buy confidential office hardware, or a surprise gift? Advances in ad retargeting will broadcast your intentions across the internet and all your devices unless you cover your tracks.
[Correction] A multithreaded, multi-core engine should greatly improve throughput. A more powerful shell interface, more user-friendly design and simpler rule language make it more accessible.
GCHQ's tablet app allows users to use encryption to create and crack messages
Doesn't it seem like RHEL 7 just came out the other day? Well, brace yourself, the next version is already on its way.
A collection of notable security news items for the week ending December 12, 2014. Covers enterprise, controversies, reports and more.
Almost two months after Google's security team revealed a major security flaw in SSLv3, an Australian government department was found to still be using the old protocol on at least one of its websites, leaving it wide open to POODLE-like attacks.
Is there a mobile privacy crisis? Symantec thinks so and has added features to Norton Mobile Security to save you from it.
This high tech, hurricane-resistant and ultra-secure facility in Fort Lauderdale is where Florida's elite store their exotic cars, precious valuables, works of art and wine collections.
Employees are prime targets for cybercrime attacks against your company. Find out the six top ways criminals gain access to your valuable data, IP, and more.
A wargame aimed at finding hidden cyber-security talent took place in Winston Churchill's wartime bunker.
Maintaining privacy online seems almost impossible, but there are a tools that can minimise the chances of your personal, financial or business data falling into the wrong hands.
What are some simple tips, tricks and best-practice methods of keeping yourself and your digital identity safe from hackers?
Behind on the news and hungry for more? Here's what we learned this week — from tweets leading to bank hacks, Windows XP lives, and who is the elusive Bitcoin inventor?
There are many reasons why users will be sticking with Windows XP after Microsoft ends all support next month. In the final analysis, none of them are good excuses.
Behind on the news and hungry for more? Here's what we learned this week — from webcam hacking, net neutrality, and all the things that are cheaper to buy than WhatsApp.
At informal infosec conference Security B-Sides SF, former Black Hat General Manager and current Global Strategist for Rapid7 Trey Ford outlined the gaps between hacking and legislation in America.
From snow cannons to deep-packet network inspection and aerial drones, here's some of the gadgets and technologies powering the Sochi 2014 Olympic Games.
Researchers shared their discovery and research on espionage malware "The Mask" (aka Careto) at the Kaspersky Labs security summit this week. ZDNet took photos of the presentation.
Exploring this Debian GNU/Linux derivative that is tightly focused on security analysis and penetration testing - and it comes with a mind-boggling array of utilities for that pupose.
Infamous security researcher Felix "FX" Lindner exposed Lawful Interception surveillance systems as easy to detect, derail, and maliciously exploit at European hacking conference 30c3.
One of our audience members asked how to back up an Office 365 document locally. It actually turns out to be pretty simple. Read this guide for the step-by-step process (which works with other Exchange servers, too).
The latest leaked documents from the NSA reveal a long collection, from 2007-2008, of software and hardware used to spy on computers, networks and to capture audio and video.
Although video is beginning to take up a large portion of traffic on the internet, search engines aren't yet at the stage where they can completely index and understand the content. ZDNet Australia speaks to Adobe on how to overcome these issues using metadata.
Speaking Tuesday at a Churchill Club event in Palo Alto, Calif., the country's Chief Information Officer Steven VanRoekel discusses innovation in the federal IT landscape. He says cybersecurity concerns should not be used as an excuse not to innovate.
Governments worldwide are investing in cyber armies and intelligence to counter growing online threats.
At the WWDC conference in San Francisco, Apple CEO Steve Jobs unveils iTunes Match, part of the company's new iCloud service. For a $24.99 annual fee, users can use iTunes Match to scan their music library for non-iTunes purchased songs. Apple then provides a DRM-free file of those songs for access from iCloud.
The Barracuda Spam Firewall 400 does its job well, but the extensive configuration options make it somewhat complicated to manage.
This mail server security appliance is child’s play to set up and manage, and great for companies with limited technical expertise.
Unique MailHurdle technology makes the RazorGate 100 stand out, but it's a little on the expensive side.
This is a good first attempt at a mail server security appliance, but it needs more development to challenge the longer-established vendors.
This appliance provides corporate-grade network protection that's both affordable and easy to live with -- a hard to beat combination for the smaller business.
Want to remain anonymous while you surf? Check out Tenebril's GhostSurf, which encrypts your Internet connection and provides some useful security-related utilities into the bargain.
ZoneAlarm Security Suite puts Norton Internet Security and McAfee Internet Security to shame with its easy-to-use features.ZoneAlarm's Security Suite is one of the best security suites we've seen.
Bargain hunters, ZoneAlarm with Antivirus is the security deal for you.Zone Labs' popular ZoneAlarm firewall, available in both free and fee versions, has always been a lone wolf in the realm of PC security.
McAfee AntiSpyware's automated spyware scanning makes this a sensible addition to any PC's security measures.McAfee AntiSpyware is a solid entry in the spyware-removal category.
This richly-featured gateway and firewall allows IT managers in small/medium-sized businesses to secure their networks easily.
This sleek and very thin Sony is good for on-the-go snapshots, but its photo quality is average.With a depth of only 8/10 of an inch, the Sony Cyber Shot DSC-T1 is one of the slimmest digital cameras we've seen.
ZoneAlarm Pro 4.0 is a great firewall for security novices, but you'll still need a separate anti-virus program.
This innovative solution provides a bridge between outsourced and in-house network security, and could appeal to many an SME.
Spybot blows the venerable Ad-aware out of the water when it comes to protecting you against ad-serving software.
PC Immobiliser is a simple device that should increase the security of any PC or notebook, and make it less attractive to thieves. The use of iButtons to restrict access to anyone who doesn’t have the correct token works seamlessly once set up.