2015's biggest security breaches: CVS, Anthem, IRS, and worse
Microsoft gives partners their Windows 10 marching orders
Here's how Microsoft is advising its reseller partners to sell Windows 10 to customers, especially enterprises.
Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Here's how Microsoft is advising its reseller partners to sell Windows 10 to customers, especially enterprises.
Facebook's battle with ad blockers intensifies after launching its ad-blocker bypass for the desktop site and Adblock Plus striking back.
Pentagon research agency DARPA wants to develop a system that's capable of countering a swarm of attack drones.
Everyone from federal agents to ambulance staff and IRS collectors all ended up on the same doorstep for years due to one lazy IP setting.
The union has said ABS staffers blame the Turnbull government for the Census crash after 'dilly-dallying' in appointing a chief statistician, changing ministers thrice, and cutting staff members.
A coalition of business groups are concerned that China's proposed cybersecurity laws will squeeze foreign competition out, harming trade and potentially violating international standards in the process.
With the convenience of mobile devices in the enterprise comes all kinds of security risks. Employees can lose their devices or share their devices— and the data on them — with people who shouldn’t have...
Scott Morrison has said the government will look thoroughly into the Census 2016 failure, and will pursue it to 'the nth degree'.
Office of Personnel Management still reeling from last year's massive theft of 21 million records
What started as an attempt to secure TCP/IP in Linux ended up enabling an attack vector that can be used to break, or even hijack, internet connections between Linux and Android systems.
Is nothing sacred in this world?
Kit includes browser OS, source code, and guidelines for writing and running new apps
Researchers find flaws in the keyless entry system used in around 100 million vehicles from the Volkswagen Group.
A single method of determining losses following a cyberattack needs to be introduced, according to the European Union Agency for Network and Information.
If you want your email to be opened by Gmail users, now would be the time to digitally sign your messages.
The vulnerabilities can lead to privilege escalation or denial of service attacks.
Weren't in Vegas for the heat and hacking? Here's what you need to know.
What are the best apps which offer strong encryption to keep out spying eyes?
There are great accessories out there to bring your Android and iOS photography to the next level.
Here are 10 easy steps to show you how to use the Tor network to mask your browsing habits.
Whether you are just paranoid or they really are out to get you, these handsets promise better security and privacy than standard phones.
The story of how Bletchley Park codebreakers decrypted top secret Nazi communications
All Android devices are different, but they all come with some basic security and privacy features. Here are the important tweaks to get started.
One of the new features that Apple rolled out with iOS 9.3 is the ability to password-protect Notes you create. But it's not immediately clear how to do this. But once you know how, it's simple.
Interested in hacking and cybersecurity? Let's get started.
If the Internet is built into everything you own, none of it will be truly safe from hackers.
While cloud backups are quick and easy, if you want total control over your iPhone or iPad backups, the only way to do it is to make encrypted local backups. Here's how to do just that.
What apps, gadgets and accessories can help you protect your smartphones, tablets and laptops on the move?
Opinion: The FBI's attempt to order Apple to help them crack an iPhone has brought out the hysterical in many of us.
Here's a look at some of the devices, platforms and technology US President Barack Obama uses to carry out his day-to-day presidential duties.
Data breaches, hacks, and vulnerable software makes it easier than ever for a hacker to get access to your data. These simple steps can help mitigate it happening in the first place.
Samsung's Galaxy Note 7 adds iris scanning as an additional layer of security. Enterprises need to watch how it scales and integrate it into security policies.
The flaw, which allows a malicious website to extract user passwords, is made worse if a user is logged in with a Microsoft account.
Tuesday's Australian 2016 Census of Population and Housing has raised a number of privacy concerns. Count von Count is among those telling us there's nothing to worry about.
Quantum computers could tear through the encryption used today, so researchers are looking at building new quantum-proof cryptography.
SMS as a two-factor authentication method will soon be discouraged, according to draft guidelines from US standards body.
Consumers still aren't doing their homework before buying and deploying internet-connected baby monitors and other products.
Cyberspace is now a potential arena of official warfare. Where do we go from here?
In the wake of a delay in the Australian federal election results, parliamentary figures are backing e-voting. But what could it risk in exchange for a quicker count?
Securing Your Mobile Enterprise
Taking care of the daily email pile before you head to work has one downside: It's when users are at their most vulnerable to a phishing attack.
Your personal details have probably already been stolen by hackers -- so what can you do to protect yourself now?
More accountability and oversight of the nation's cyberweapons projects would be a good thing.
Sometimes Apple does good when it comes to security, and sometimes it is baffling.
When starting a new business, one of the first decisions is to decide what content management system to use for its web site, and from a security perspective, there is one clear leader in the field.
Ransomware is occurring with greater frequency, but some basic infosec hygiene can keep you safe.
Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.
An ideal backup tool for small businesses and larger enterprises alike, vmProtect 6 makes light work of protecting and rapidly recovering virtual machines on VMware vSphere hosts.
SonicWALL's feature-packed TZ 210 gateway security appliance is capable of protecting all kinds of networks at a very affordable price. It's easy to setup and manage, and sets a new price point in the UTM market.
McAfee Internet Security 2009 does a reasonable job, but it also leaves room for improvement.
As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.
Symantec Backup Exec System Recovery 8 provides flexibility when creating desktop and laptop backups. If you have high value data stored on your computer, then we think $106.53 is a reasonable price to ensure it's protected.
Symantec Backup Exec 12 allows complete system recovery and concentrates on continuous file/data protection. Though AU$1,795 may seem a lot of money for an application, Backup Exec might be worth the investment if you're using it for irreplaceable and highly valuable data.
Lavasoft Ad-Aware 2007 came in dead last in our CNET antispyware testing. Ad-Aware failed to detect half of the test spyware, and unlike nine out of the 10 other antispyware apps we reviewed in December 2007, left behind traces for all but one spyware.
This SSL VPN appliance suffers from an awkward admin interface and depends on ActiveX for some functionality, but it's still a relatively simple way to provide remote access to network applications.
Trend Micro's IGSA delivers relatively complete protection from viruses, spyware, spam and other threats at the internet gateway. However, you can't add your own scanning protocols and the restriction to Windows and IE clients for the Damage Cleanup Services feature is a drawback.
By porting its established security tools onto a powerful dual-core hardware platform, SmoothWall has come up with a highly effective and very scalable appliance that will appeal to a broad spectrum of buyers.
The ZyWALL SSL 10 would suit a small organisation that just wants general remote network access at a low price.
Fortinet has taken their proven UTM firmware and hardware experience and combined those with a 24-port network switch. While perhaps not suited to larger enterprises, the FortiGate-224B certainly represents an excellent proposition for SMB or branch office deployment and worthy of further research.
Symantec Backup Exec 11d performs well, installation is a breeze and considering the ability to backup and restore individual database records and substantially reduce downtime, it isn't difficult to justify the price.
This is a good choice for small companies looking to replace an internet router with a device that also supports SSL VPN remote access. However, it fails to stand out in the crowded SSL market.
Security
Networking
Security
Security
For privacy and security, change these iOS 9 settings right now
Security