Whatever you do, don't break the law...
Whatever you do, don't break the law...
New research suggests that the average cost of data breaches is lower than many estimates and too low to drive greater investment in cybersecurity.
There's no rancor or bitterness, however, since Akamai hosted the security expert's blog pro bono.
A new government scheme designed to help protect the UK from cyberattacks has been launched.
An analysis of hijacked websites suggests Google's Safe Browsing technology is only warning users about a small proportion of them.
One of the critical vulnerabilities allows attackers to remotely execute malicious code.
The Australian Bureau of Statistics has said IBM should have been able to handle the denial-of-service attack that hit Census systems on the night of August 9.
Leveraging Palo Alto Networks' cybersecurity platform, Optus and Singtel will now provide enterprise and government customers with detection and prevention mechanisms against cyber attacks.
Australian Prime Minister Malcolm Turnbull has used the Census fiasco to call for new ways of talking about cybersecurity during a speech in Washington DC.
Yahoo confirmed a breach going back to 2014. A bevy of passwords and other information were stolen, but payment and bank information stayed safe.
The odds are excellent that your Yahoo account is now open for attack to the highest bidder.
Hackers are taking advantage of lax security attitudes around connected devices to hijack them for malicious means, researchers have warned.
Google has come under fire again for the privacy choices it's made for its new smart chat app, Allo.
Attacks targeting the financial messaging system are not going anywhere -- and are evolving to become even more difficult to combat.
Before you do anything on your new iPhone or iPad, you should lock it down. This is how you do it.
The most recent Summer Olympiad staked its place in history as the competition with the highest levels of digital engagement than any previous Olympic Games. We look at some of the key technology numbers behind the Rio events.
All Android devices are different, but they all come with some basic security and privacy features. Here are the important tweaks to get started.
From improved connectivity to skills creation, we look into some of the technology benefits that Games host city Rio de Janeiro - as well as all of Brazil - will retain after the sporting competitions end.
Weren't in Vegas for the heat and hacking? Here's what you need to know.
What are the best apps which offer strong encryption to keep out spying eyes?
There are great accessories out there to bring your Android and iOS photography to the next level.
Here are 10 easy steps to show you how to use the Tor network to mask your browsing habits.
Whether you are just paranoid or they really are out to get you, these handsets promise better security and privacy than standard phones.
The story of how Bletchley Park codebreakers decrypted top secret Nazi communications
One of the new features that Apple rolled out with iOS 9.3 is the ability to password-protect Notes you create. But it's not immediately clear how to do this. But once you know how, it's simple.
Interested in hacking and cybersecurity? Let's get started.
If the Internet is built into everything you own, none of it will be truly safe from hackers.
While cloud backups are quick and easy, if you want total control over your iPhone or iPad backups, the only way to do it is to make encrypted local backups. Here's how to do just that.
What apps, gadgets and accessories can help you protect your smartphones, tablets and laptops on the move?
The ORWL by Design Shift is a portable PC with anti-tampering tech baked in.
Samsung's Galaxy Note 7 adds iris scanning as an additional layer of security. Enterprises need to watch how it scales and integrate it into security policies.
The flaw, which allows a malicious website to extract user passwords, is made worse if a user is logged in with a Microsoft account.
SMS as a two-factor authentication method will soon be discouraged, according to draft guidelines from US standards body.
Consumers still aren't doing their homework before buying and deploying internet-connected baby monitors and other products.
BlackBerry's newest phone is a passable for its price, but its misguided effort to promote its security as something bar-raising will not stand the test of time.
This indoor camera could be great for monitoring the interior of your home. But is it worth the effort?
To complement its completely wireless, battery-powered Arlo cameras, Netgear has launched an HD networked security camera that adds more features, but needs a power connection.
Calling this a "privacy" phone is a stretch, but it has some redeeming features. A keyboard for one, and Android for another.
This tank-like tablet has a durable design, allowing it to withstand some of the toughest climates.
Meet the latest iteration of the secure and privacy-centric Android-based smartphone.
Netatmo's Welcome is a clever HD security camera with a key selling point in the form of its face recognition technology. Upcoming motion-sensing tags will deliver extra security functionality.
Seen too many dubious security-in-a-box solutions? USB armory is the real deal for anyone looking to protect and control their personal digital privacy and security. But is this real deal ready for regular users?
Plenty of connected cameras are suitable for monitoring your home or office, but Netgear's new Arlo is completely wireless and comfortably waterproof, with infrared built in for night and dark areas. It's increasingly extensible too.
Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.
An ideal backup tool for small businesses and larger enterprises alike, vmProtect 6 makes light work of protecting and rapidly recovering virtual machines on VMware vSphere hosts.
SonicWALL's feature-packed TZ 210 gateway security appliance is capable of protecting all kinds of networks at a very affordable price. It's easy to setup and manage, and sets a new price point in the UTM market.
McAfee Internet Security 2009 does a reasonable job, but it also leaves room for improvement.
As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.
Symantec Backup Exec System Recovery 8 provides flexibility when creating desktop and laptop backups. If you have high value data stored on your computer, then we think $106.53 is a reasonable price to ensure it's protected.