How does spyware get its hooks into your computer and what can you do to remove it?
By ZDNet Staff
| March 8, 2005 -- 21:15 GMT (13:15 PST)
| Topic: Security
Digital Health and Wellness
How technology can save the NHS
Samsung Galaxy Note 9 is official: Here's what's new
Photos: BlackBerrys through the ages
The scariest tech of 2017, period, end of sentence
Banks praised for their internal cyber defence capabilities
With concerns over where the responsibility of attribution should lie.
Windows 7 users: You need SHA-2 support or no Windows updates after July 2019
Tor traffic from individual Android apps detected with 97 percent accuracy
New machine learning algorithm can detect when you're using a specific app, such as YouTube, Instagram, Spotify, others.
Women in tech: Two prominent female CISOs speak out (CxOTalk interview)
Google Earth accidentally reveals secret military sites
The sites offer a glimpse of missiles and launchers in excruciating detail.
White hats spread VKontakte worm after social network doesn't pay bug bounty
VKontakte flooded with spam over Valentine's Day as part of a revenge prank.
Key takeaways from damning UK report on Facebook’s world of “digital gangsters”
The committee report on fake news and data misuse says Facebook maximizes revenue “at all costs” -- even when the cost is user privacy and trust.
Nine telcos had no metadata interception plan by mid-2018: ACMA
Australia has a challenge of scaling defence capabilities for large cyber attacks
Major General Marcus Thompson says Australia's ability to scale its defence capabilities when it comes to the crunch is what keeps him up at night.