Articles about Security
An award-winning secure online identity verification platform developed by the New Zealand government is struggling to win users.
Central to the new features is a heightened level of control over shared files, such as the ability to to disable downloading, printing and copying of any file with designated information rights management.
Symantec says a new Trojan-based campaign, focused on the Middle East, is targeting the energy industry and its trade secrets.
DDoS attacks are not only a disruption but can also cost businesses dearly, according to Neustar research.
Modern lives leave a digital trail, and most people are unaware of just who is auditing it. Security expert Bruce Schneier examines how governments, corporations, individuals and society as a whole can deliver a better balance between security and privacy.
The news has been filled with stories of high-profile breaches in cyber security at large businesses. The hacking has caused havoc on a variety of levels, compromising bank accounts, embarrassing corporate...
from TechProResearch »
The Department of Immigration and Border Protection's response to the G20 data breach was precisely wrong. Twice.
The Chinese government has failed to deny claims that it is behind the distributed denial-of-service attack on GitHub, with the attack close to entering its 120th hour.
The personal details of the world's G20 leaders were accidentally emailed to the organisers of the Asian Cup by a staff member of the Department of Immigration and Border Protection, which chose to avoid notifying the leaders.
Are you getting threat intel -- or just antivirus software? A government-backed report designs a framework for threat intelligence that can be scaled to different sectors, sizes of organization, and organizational goals.
Online screenshot-sharing service Puush is warning its users to change their passwords after it emerged that the platform had been infected with malware.
The European agency says tracking and monitoring terrorist suspects is increasingly difficult in a world where encryption is becoming commonplace.
The airline has confirmed thousands of frequent flyer accounts have been accessed.
US coding website GitHub is fending off a DDoS onslaught focused on shutting down anticensorship tools.
The conditions are ripe for businesses and services to do away with wanting to get their hands on as much of their users' information as possible.
Google Chrome, Oracle Solaris and Gentoo Linux all beat Microsoft's Internet Explorer in having the most vulnerabilities last year, according to Secunia, while IBM software took 40 percent of the Top 20 places.
What are phishing campaigns, why do they exist and how do I protect myself?
What is malware, what does it do and how do I protect myself?
Follow these simple tips to make protecting your identity easier.
There are a lot of players in the mandatory data-retention debate. We look at who is for the legislation, and who is opposing it.
The Internet of Things opens up a world of possibilities for our connected lives. But what if a hacker could gain control of the things that mean the most to us. Here we investigate some possible hacking scenarios that could just happen.
Before you sync your iCloud or reinstall your apps, you need to lock down your new iPhone or iPad. Here are the important tweaks you need to protect your privacy.
Here are five ways to secure the data on your Mac using both built-in tools and third-party utilities. All of these are robust tools that can thwart both casual snoopers and hardcore hackers. And on top of that, they won't cost you a dime.
Your home router is vulnerable to attacks as soon as you take it out of the box. Here are a number of ways you can secure your home wireless network.
When a person passes away, their social account can become a memorial of their life, friendships and experiences. See step-by-step instructions for selecting your legacy contact.
It's nasty, but you don't have to be held to ransom by it.
From encrypted instant messengers to secure browsers and operating systems, these privacy-enhancing apps, extensions, and services can protect you both online and offline.
Think you don't need an antivirus scanner for your Mac? Get your head out of the sand and get protected!
Here are six top-quality scanners that will help you clean up systems and keep them safe in the future. There are tools here for systems ranging from Windows XP to Windows 8.1.
2014 was a pretty rough year from a cybersecurity perspective. So that means that 2015 will be better, right? Right? Yeah, not so much. We'll tell you why.
Hundreds of millions of records have been stolen this year through hacks and data breaches as a result of poor, or flawed security. Here are the most notable stories of the year.
If you think the government cannot and does not want to get its hands all over your personal data, then think again.
If a website falls under attack by a hacker, why shouldn't it be able to respond? Juniper Networks shows ZDNet how businesses can fight back against common website attacks and help others know what is coming.
Hurricane Sandy was a major test for New York City IT departments and the disaster recovery plans they put in place following 9/11. Here is some of the best DR advice from IT leaders whose companies survived it.
ZDNet gathered several market players in a roundtable discussion held in Singapore, and asked if organizations in Asia were doing enough today to support bring-your-own-device adoption.
WatchGuard director of security strategy Corey Nachreiner walks the audience at AusCERT 2013 through some of the tools that hackers use to break into systems.
Nigerian scam victim Jill explains how she was conned out of $300,000 over a four year period.
What do security specialist HD Moore and the Queensland Police have in common? They both feature in this lighthearted round-up of day 1 at AusCERT 2013.
ZDNet's IT Priorities 2013 panel discussion debated the evolving role of CIOs in Asia as well as the role of ICT as a driver of innovation for organizations in this region.
Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.
An ideal backup tool for small businesses and larger enterprises alike, vmProtect 6 makes light work of protecting and rapidly recovering virtual machines on VMware vSphere hosts.
SonicWALL's feature-packed TZ 210 gateway security appliance is capable of protecting all kinds of networks at a very affordable price. It's easy to setup and manage, and sets a new price point in the UTM market.
McAfee Internet Security 2009 does a reasonable job, but it also leaves room for improvement.
As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.
Symantec Backup Exec System Recovery 8 provides flexibility when creating desktop and laptop backups. If you have high value data stored on your computer, then we think $106.53 is a reasonable price to ensure it's protected.
Symantec Backup Exec 12 allows complete system recovery and concentrates on continuous file/data protection. Though AU$1,795 may seem a lot of money for an application, Backup Exec might be worth the investment if you're using it for irreplaceable and highly valuable data.
Lavasoft Ad-Aware 2007 came in dead last in our CNET antispyware testing. Ad-Aware failed to detect half of the test spyware, and unlike nine out of the 10 other antispyware apps we reviewed in December 2007, left behind traces for all but one spyware.
This SSL VPN appliance suffers from an awkward admin interface and depends on ActiveX for some functionality, but it's still a relatively simple way to provide remote access to network applications.
Trend Micro's IGSA delivers relatively complete protection from viruses, spyware, spam and other threats at the internet gateway. However, you can't add your own scanning protocols and the restriction to Windows and IE clients for the Damage Cleanup Services feature is a drawback.
By porting its established security tools onto a powerful dual-core hardware platform, SmoothWall has come up with a highly effective and very scalable appliance that will appeal to a broad spectrum of buyers.
The ZyWALL SSL 10 would suit a small organisation that just wants general remote network access at a low price.
Fortinet has taken their proven UTM firmware and hardware experience and combined those with a 24-port network switch. While perhaps not suited to larger enterprises, the FortiGate-224B certainly represents an excellent proposition for SMB or branch office deployment and worthy of further research.
Symantec Backup Exec 11d performs well, installation is a breeze and considering the ability to backup and restore individual database records and substantially reduce downtime, it isn't difficult to justify the price.
This is a good choice for small companies looking to replace an internet router with a device that also supports SSL VPN remote access. However, it fails to stand out in the crowded SSL market.
The best of ZDNet, delivered
- 1 Risk assessments are crucial for cloud deployments: CISO
- 2 Registry hack enables continued updates for Windows XP
- 3 Microsoft's Windows 10: More on the 'under the covers' security, Store features
- 4 How to delete every Facebook wall post, wipe your Timeline
- 5 Facebook virus or account hacked? Here's how to fix it.