It's time to patch your Linux servers and PCs again.
It's time to patch your Linux servers and PCs again.
Anyone can exploit the flaw after the exploit code was published.
Law enforcement has trained special dogs to find hidden thumb drives and cell phones that human investigators routinely miss, and it's foiling predators, terrorists, and other criminals.
Emails pretend to be queries from customers, but contain information stealing malware.
A 'cyber game' held in Canberra suggests that commercial and diplomatic solutions would be more effective long-term than chasing the hackers.
New data says the tech giant complied with over three-quarters of all US requests.
Preventing Distributed Denial of Service attacks is both a technical and business issue.
The company issued a $10,000 reward to the researcher for privately reporting the flaw.
Over 80 different Sony IP camera models are impacted by the security vulnerability.
The gamification lures hackers into the fold with exploit tools and fraud software up for grabs.
One of the cyberattackers who helped down major websites is just a teenager.
Is the cloud about to shed its reputation for decreasing enterprise security - and will instead enhance it?
The state's Office of the Auditor General has made six recommendations to prevent the threat of malware after investigating six West Australian government agencies.
Microsoft plans to add more security and manageability features to Windows 10 Creators Update before its debut in Spring 2017. Here's what's coming.
Low-cost-of-entry schemes on the dark web mean any wannabe hacker can get their hands on the resources needed to phish specific targets.
Sure, you can take down a drone wirelessly or even with a trained falcon. But wouldn't you rather use a massive Nerf gun that can shoot down the target by trapping it in a net?
We look back at the biggest mistakes, controversies, and screw-ups from the tech world this year.
Over two billion records were stolen in 2016 alone -- and the year isn't over yet.
Before you do anything on your new iPhone or iPad, you should lock it down. This is how you do it.
Unmanned Warrior showcases autonomous boats, drones and submersibles as the Royal Navy looks at the future of warfare.
The most recent Summer Olympiad staked its place in history as the competition with the highest levels of digital engagement than any previous Olympic Games. We look at some of the key technology numbers behind the Rio events.
All Android devices are different, but they all come with some basic security and privacy features. Here are the important tweaks to get started.
From improved connectivity to skills creation, we look into some of the technology benefits that Games host city Rio de Janeiro - as well as all of Brazil - will retain after the sporting competitions end.
Weren't in Vegas for the heat and hacking? Here's what you need to know.
What are the best apps which offer strong encryption to keep out spying eyes?
There are great accessories out there to bring your Android and iOS photography to the next level.
Here are 10 easy steps to show you how to use the Tor network to mask your browsing habits.
Whether you are just paranoid or they really are out to get you, these handsets promise better security and privacy than standard phones.
The story of how Bletchley Park codebreakers decrypted top secret Nazi communications
One of the new features that Apple rolled out with iOS 9.3 is the ability to password-protect Notes you create. But it's not immediately clear how to do this. But once you know how, it's simple.
Security experts say voting machines are easy to tamper with, and in several key battleground states ballots will be nearly impossible to verify.
Reports of law enforcement agencies and police departments using the service to spy on suspects has caused the company 'great concern.'
Facebook's chief security officer Alex Stamos said the company is also exploring two-factor authentication options to boost security.
Cellular networking carriers can use the latest analytics technologies to detect bad behavior.
Tech-support scammers are having good luck reaching young victims with pop-up ads.
Don't be tricked into handing over your online banking credentials to cybercriminals.
The entire Web seemed to be broken Friday for users in the United States, with many major sites suffering outages.
Business users find high-capacity USB thumb drives to be fast, convenient, and the perfect personal cloud. Until they get lost. If protecting confidential data is important, here's a USB thumb drive that will do the job.
BlackBerry's newest phone is a passable for its price, but its misguided effort to promote its security as something bar-raising will not stand the test of time.
This indoor camera could be great for monitoring the interior of your home. But is it worth the effort?
To complement its completely wireless, battery-powered Arlo cameras, Netgear has launched an HD networked security camera that adds more features, but needs a power connection.
Calling this a "privacy" phone is a stretch, but it has some redeeming features. A keyboard for one, and Android for another.
This tank-like tablet has a durable design, allowing it to withstand some of the toughest climates.
Meet the latest iteration of the secure and privacy-centric Android-based smartphone.
Netatmo's Welcome is a clever HD security camera with a key selling point in the form of its face recognition technology. Upcoming motion-sensing tags will deliver extra security functionality.
Seen too many dubious security-in-a-box solutions? USB armory is the real deal for anyone looking to protect and control their personal digital privacy and security. But is this real deal ready for regular users?
Plenty of connected cameras are suitable for monitoring your home or office, but Netgear's new Arlo is completely wireless and comfortably waterproof, with infrared built in for night and dark areas. It's increasingly extensible too.
Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.
An ideal backup tool for small businesses and larger enterprises alike, vmProtect 6 makes light work of protecting and rapidly recovering virtual machines on VMware vSphere hosts.
SonicWALL's feature-packed TZ 210 gateway security appliance is capable of protecting all kinds of networks at a very affordable price. It's easy to setup and manage, and sets a new price point in the UTM market.
McAfee Internet Security 2009 does a reasonable job, but it also leaves room for improvement.
As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.
Symantec Backup Exec System Recovery 8 provides flexibility when creating desktop and laptop backups. If you have high value data stored on your computer, then we think $106.53 is a reasonable price to ensure it's protected.