Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

Two-month wait for government POODLE patch

Two-month wait for government POODLE patch

Almost two months after Google's security team revealed a major security flaw in SSLv3, an Australian government department was found to still be using the old protocol on at least one of its websites, leaving it wide open to POODLE-like attacks.

published December 11, 2014 by

Comments

Kali Linux 1.0.6, hands-on

Kali Linux 1.0.6, hands-on

Exploring this Debian GNU/Linux derivative that is tightly focused on security analysis and penetration testing - and it comes with a mind-boggling array of utilities for that pupose.

published January 24, 2014 by

Comments

A world without Wikipedia

Jimmy Wales jumped on the "screw SOPA" bandwagon this week and led Wikipedia into a 24-hour blackout to protest, causing panic, confusion and general hysteria among the knowledge-seeking population. But ask yourself this: what if Wikipedia never came back online?

published January 19, 2012 by

Comments

Metadata key to video industry: Adobe

Although video is beginning to take up a large portion of traffic on the internet, search engines aren't yet at the stage where they can completely index and understand the content. ZDNet Australia speaks to Adobe on how to overcome these issues using metadata.

published November 17, 2011 by

Comments

Steve Jobs' one more thing: iTunes Match

At the WWDC conference in San Francisco, Apple CEO Steve Jobs unveils iTunes Match, part of the company's new iCloud service. For a $24.99 annual fee, users can use iTunes Match to scan their music library for non-iTunes purchased songs. Apple then provides a DRM-free file of those songs for access from iCloud.

published June 6, 2011 by

Comments

Check Point Safe@Office 225

Check Point Safe@Office 225

This appliance provides corporate-grade network protection that's both affordable and easy to live with -- a hard to beat combination for the smaller business.

published October 27, 2004 by

Comments

GhostSurf 2005 Platinum

GhostSurf 2005 Platinum

Want to remain anonymous while you surf? Check out Tenebril's GhostSurf, which encrypts your Internet connection and provides some useful security-related utilities into the bargain.

published October 8, 2004 by

Comments

ZoneAlarm Security Suite

ZoneAlarm Security Suite

ZoneAlarm Security Suite puts Norton Internet Security and McAfee Internet Security to shame with its easy-to-use features.ZoneAlarm's Security Suite is one of the best security suites we've seen.

published May 27, 2004 by

Comments

ZoneAlarm with Antivirus

ZoneAlarm with Antivirus

Bargain hunters, ZoneAlarm with Antivirus is the security deal for you.Zone Labs' popular ZoneAlarm firewall, available in both free and fee versions, has always been a lone wolf in the realm of PC security.

published May 26, 2004 by

Comments

McAfee AntiSpyware

McAfee AntiSpyware

McAfee AntiSpyware's automated spyware scanning makes this a sensible addition to any PC's security measures.McAfee AntiSpyware is a solid entry in the spyware-removal category.

published May 18, 2004 by

Comments

Sony Cyber Shot DSC-T1

Sony Cyber Shot DSC-T1

This sleek and very thin Sony is good for on-the-go snapshots, but its photo quality is average.With a depth of only 8/10 of an inch, the Sony Cyber Shot DSC-T1 is one of the slimmest digital cameras we've seen.

published March 23, 2004 by

Comments

Network Box - SOHO

Network Box - SOHO

This innovative solution provides a bridge between outsourced and in-house network security, and could appeal to many an SME.

published April 16, 2003 by

Comments

Chirson PC Immobiliser

Chirson PC Immobiliser

PC Immobiliser is a simple device that should increase the security of any PC or notebook, and make it less attractive to thieves. The use of iButtons to restrict access to anyone who doesn’t have the correct token works seamlessly once set up.

published January 28, 2003 by

Comments

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories