TLS 1.0 and 1.1 deprecation in Edge and IE scheduled for the first half of 2020.
A fresh attack wave is launching Octopus at diplomatic organizations across the region.
Bug crashes and freezes PlayStation 4 consoles. The only way to recover is by performing a factory reset for the entire console.
The bug can be exploited to gain access to photos stored on a user's device.
New guidelines for IoT makers have been published. But will device manufacturers pay attention?
An Australian senate committee has recommended passing the My Health Records Amendment (Strengthening Privacy) Bill 2018, but Labor senators have lashed out at the government's "stubborn refusal" to fix further problems.
Getting rid of passwords is a good idea, but we need to think through the consequences of the most likely replacement, too.
Tech giants including Apple, Cisco, and Mozilla have criticised the Australian government for wanting to introduce laws that would allow for access to encrypted content.
The highly popular PHP 5.x branch will stop receiving security updates at the end of the year.
Around 30,000 DOD civilian and military personnel are believed to be affected.
Microsoft's patch for a JET database engine zero-day deemed incomplete.
Fuchsia is Google's mystery operating system. At the recent Linux Security Summit, the NSA revealed what they've found out about it to date.
Take this short, multiple choice survey and tell us about your company's cyberwarfare experience and cybersecurity strategies for the upcoming year.
Company said 29 million of the 30 million also had personal data scraped by the attackers.
Not every instance of every cloud for every app for every workflow for every collection of data types is equal.
Here are the steps you should take to lock down an iPhone or iPad running iOS 12.
Need help wiping the slate clean? Here are some instructions on removing and wiping services most likely to store your data and online activities.
Initial Coin Offerings (ICOs) are part of the cryptocurrency Wild West, but how do you know what is fraudulent and what is legitimate?
These are the worst known cyberattacks which are believed to be the work of hackers backed by governments and ruling parties worldwide.
If you suspect your device has been tampered with, follow these steps.
The Hillsboro, Oregon lab showcases a range of threats, including adversarial machine learning used on autonomous vehicles, Windows vulnerabilities, medical device flaws and blockchain attacks.
The Apricorn Aegis Padlock SSD fits into the palm of your hand, yet features AES-XTS 256-bit hardware encryption, a wear-resistant keypad, and the case is impervious to dust, grit and water.
Dozens of breaches, over a billion affected.
When it comes to portable and durable data security, IronKey is a trusted name, and if you want a USB flash drive that will securely and safely store your data, the D300 is worth taking a look at.
Many of the popular security cameras available to purchase right now not only make your home or office safer but also smarter. They're loaded with intelligent features and sometimes even include support for digital assistants like Alexa, all with the purpose of giving you some peace of mind.
Also known as private browsing or porn mode, your browser privacy setting has all sorts of useful applications that have nothing to do with hiding the consumption of adult content.
Everybody knows that 12345 is a bad password. But what they're using instead isn't much stronger
Many of the massive cyberattacks that have spread across the world in recent years were traced back or attributed to North Korea. Here are eleven examples.
Many now think that passwords cannot secure their PCs and phones, so how will we gain access to our devices in the near future?
A roundup of some of the more bizarre things that are online -- but really shouldn't be.
Free - but powerful - tools are being used by everyone ranging from cyber criminals to nation-state operators, says a report by five government security agencies.
The South Korean telco will first develop a private blockchain for use in its donation affiliate, then launch it as a full public blockchain.
Some attackers are willing to part with large amounts of money in order to gain access to accounts they believe they can exploit in business email compromise scams.
The company hopes to make the technology 'practical' within fiscal 2020.
Drills are the weapon of choice for criminals who spy on your activities at the cash point.
If your Twitter is hacked, it could be gone permanently and Twitter may not help. Here is one user's sad story and how you can protect yourself.
Tonya Hall talks with Oas Rege, chief marketing and strategy officer at MobileIron, about how businesses are learning to balance mobile security with convenience regarding mobile devices.
Facebook was fined £500,000 under the Data Protection Act for the Cambridge Analytica scandal but may not get away so lightly this time. Read more: https://zd.net/2zLSEtj
The proposed legislation has been called out for prioritising the perceived greater good instead of respecting minimal rights of the individual.
Twitter announces three new major rule changes to its site rules and policies.
You get additional security on you account; Facebook gets a phone number for its targeted advertising product.