Cyber Security Agency says the number of common cyber threats, including website defacements and phishing, dipped in Singapore last year, but expects to see more frequent data breaches and disruptive attacks against the cloud in the near future.
Mozilla releases Firefox 67.0.3 to fix actively exploited zero-day.
Microsoft's newest Azure service, Bastion, is now in public preview and is meant to bring another level of security to remotely accessing virtual machines.
FBI warns security clearance holders to be careful when disclosing work information on social media profiles.
There’s promise and peril in the still-evolving world of cryptocurrencies such as Bitcoin and Ether. Here's everything individuals and businesses need to know about the basics of wallets, exchanges, and the next directions in this expanding ecosystem.
Google launches new "Suspicious Site Reporter" Chrome extension.
Ring's latest video doorbell should make apartment dwellers feel a little safer.
Fake domains and bogus websites are experiencing something of a revival - unfortunately.
Having your identity stolen can be a nightmare, and cleaning up the mess can take months. You can make life difficult for a would-be identity thief by locking down these five key aspects of your online life.
DHS cybersecurity agency warns US businesses to apply Microsoft's BlueKeep patch for wormable flaw.
Netflix discovers multiple 'critical' security flaws in the Linux and FreeBSD kernels' TCP stack that could lead to server outages.
Smuggling malware into the power grids of rival states risks making tensions higher, especially when the rules of the game are yet to be established.
Hacker "Gnosticplayers" took credit for the hack in a private conversation with ZDNet last month.
The zero-day bug impacts multiple models in the TP-Link product line.
Google restricted SMS controls. Hackers found a way around it.
If you want to beef up the security on your Google Account, then the Advanced Protection Program those at risk of targeted attacks – such as journalists, activists, business leaders, and political campaign teams – is for you. Here's how to enable the Google Advanced Protection Program.
Disassembly of a Google Titan Bluetooth two-factor security key .
2019 is already proving a fruitful year for hackers with millions of records stolen, medical data leaks, and credit card data theft.
European law enforcement has smashed everything from Dark Web marketplaces to ATM skimmer rings.
Interested in the world of cybersecurity? Consider picking up a copy of these books to enjoy over summer.
For the past few years, the FBI has been keeping a separate list of the US' most wanted cybercriminals. Time to take a look at who's still on it -- in no particular order.
Your iPhone and iPad is likely packed with important, valuable, and even sensitive information that you might not want others to be able to access. Here are the steps you should take to lock down an iPhone or iPad running iOS 12.3.
Your iPhone and iPad is likely packed with important, valuable, and even sensitive information that you might not want others to be able to access. Here are the steps you should take to lock down an iPhone or iPad running iOS 12.2.
What would a modern-day Plague of Lice look like?
The technology managing the systems in our cars could be open drivers up to the risk of hacking. Find out the most common digital threats to our cars, and how you can reduce your risk.
This gallery contains a list of the technologies that have been many times at the heart of a large number of data breaches incidents in the past few years.
Time and time again, Facebook has been slammed for privacy practices and data handling. Here are some of the most prominent, recent scandals of note.
Whether you're in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. One of these could be your best bet.
Although hackers are getting more and more sophisticated, you can still recognize that something is not right online. NordVPN shares tips on spotting a phishing message -- and keep your online activities safe.
Bypassing passcodes, malware-laden apps, and inherent design flaws exposing almost all known mobile devices made up part of the security problems found in iOS and Android.
Researchers have detailed the newly uncovered malware, but it's still uncertain what the goal of the botnet campaign is.
ZDNet's Matt Miller sits down to tell TechRepublic's Karen Roby about his devastating encounter of his phone, bank account, twitter account, and so much more being hacked. Read more: https://zd.net/2WQMftO
Hackers that tried to interfere with the safety systems of an industrial plant are now looking at power utilities, too.
The company's CEO has confirmed the timing coincided with the Hong Kong extradition law protests organised on his platform. Read more: https://zd.net/2KSnF4A
Over 2.8TB of data are analysed in every case involving digital evidence by WA Police.
Internet providers will not be able to penalize those who refuse, either.
Google cracks down on misleading marketing and extensions with shady descriptions. Read more: https://zd.net/2MIQ1k9
Tech giants speak out against GCHQ's idea for silently adding a spy to an encrypted messaging chat.
ZDNet's Steve Ranger tells Karen Roby that Microsoft now says that Windows 10 passwords don't need to expire and believes that other companies should be taking note. Read more: https://zd.net/2WIeECs
ZDNet's Chris Matyszczyk sits down with Karen Roby from TechRepublic to talk about a study performed on behalf of software asset management company Snow Software that found millennials are at it again -- this time, for ignoring office IT rules to benefit themselves. Read more: https://zd.net/2WCq1eT
Dark web listings of malware aimed at companies are on the rise.
Jonathan Lomurro, partner at Lomurro Law, sits down with Tonya Hall to talk about steps that individuals need to take in order to protect their health data.