US imposes sanctions against Russia's Central Scientific Research Institute of Chemistry and Mechanics (CNIIHM).
Apple notarization process bypassed for the second time in six weeks.
Microsoft has unveiled a new open-source "matrix" that hopes to identify all the existing attacks that threaten the security of machine learning applications.
With the election window closing, phishing groups are striking the iron while it's hot.
The worst of the bugs is an uncontrolled search path issue with severe, exploitable consequences.
East London council tries to restore services after 'serious and complex' attack creates disruption.
Microsoft adds the Meet Now icon to the taskbar in the latest Windows 10 20H2 preview, as well as in 1903 and 1909.
Following research that shows certain triggers could help people digitally disappear.
You can't build a safe office tower on shaky foundations, and the same applies to your data networks. Ask your suppliers whether they've got it right.
Ransomware attacks are still a huge threat despite a decline in numbers. Focusing on the basics can deliver big gains for defenders.
US government officials have also accused Iran of being the culprit behind a wave of fake Proud Boys emails that have been sent to registered Democrat voters.
The contact details of at least 15 Australian citizens were reportedly included in the 'Cc' field of an email.
Comment flowed from concerns by Senators that there isn't much difference between a cyber attack from a foreign state and a foreign entity gaining access to data on an Australian citizen.
ANAO audit left the department with a number of recommendations, mostly around risk assessment.
Intrusions blamed on a Russian hacker group known as Energetic Bear.
FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.
The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be managed from anywhere you have an internet connection.
The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ports or NFC.
The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have been asking for -- USB-C support.
Transparency in security.
Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion.
Would you like to spend less time unlocking your Android smartphone? Android has you covered.
Quite a few readers have expressed an interest in seeing what's inside a super-secure DataLocker DL3 encrypted hard drive. Well, let's get the screwdrivers out and take a look!
I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download.
External hard drive featuing AES 256-bit XTS mode encryption and a built-in LCD keypad.
Millions of us have adopted smart home and IoT devices, but these products continually prove themselves to be vulnerable endpoints. Here are some of the most noteworthy IoT cyberattack examples of this year.
Time to dump those cheap dollar-store flash drives, or the ones you picked up at a trade show and get a encrypted micro USB SSD that would impress James Bond.
Despite a worldwide pandemic, cyberattackers haven't stopped poking holes in our defenses. These are the worst incidents so far in 2020.
Minut is a noise, temperature, and motion sensor that has been built for privacy that's aimed primarily at the short-term rental market -- think Airbnb, that sort of thing.
These laptops conform to Microsoft’s Windows 10 Secured-core PC requirements and have been tested to meet or exceed MIL-STD-810G standards.
In additional to financial costs and reputational damage, a ransomware attack can also lower the confidence of your information security team, too.
Danny Palmer tells Karen Roby about a worldwide hacking crew that's now focused on ransomware attacks and why they've made this change. Read more: https://zd.net/3j89rKd
ZDNet Security Update: Danny Palmer talks to Jaya Baloo, CISO at Avast, about an industry scheme that monitors malicious activity aiming to make it easier for everyone to protect against new cyber threats.
Researchers at BlackBerry describe Bahamut as a mercenary hacking group behind a "staggering" number of sophisticated campaigns.
Don't click on that email! Find everything you need to know in this phishing guide, including how to protect yourself from one of the most common forms of cyberattack.
There’s promise and peril in the still-evolving world of cryptocurrencies such as Bitcoin and Ether. Here's everything individuals and businesses need to know about the basics of wallets, exchanges, and the next directions in this expanding ecosystem.
ZDNet Security Update: Danny Palmer talks to Adenike Cosgrove, Cybersecurity Strategist at Proofpoint, about what motivates malicious insiders and how they can be as much of a threat to your organization as cyber attackers or hackers.
Danny Palmer tells Karen Roby how Distributed Denial of Service attacks are crude but effective -- and they're getting more powerful. Read more: https://zd.net/2Gw5e5N
ZDNet Security Update: Danny Palmer talks to Adam Boulton, CTO at BlackBerry, about the challenges the auto industry faces when it comes to building cybersecurity into autonomous vehicles.
Tonya Hall sits down with Dr. Ronald Ross, fellow at the National Institute of Standards and Technology, about the process for updating federal security control baselines and how the underlying security principles remain unchanged.
Security professionals worry about being targeted by state-backed hackers; or more likely getting caught in the crossfire.
ZDNet Security Update: Danny Palmer talks to BlueVoyant International chairman and ex-GCHQ boss Robert Hannigan about cyber attackers targeting third-party suppliers as a weak entry point into larger businesses. Read more: https://zd.net/3jejaQl
You might not make a million dollars, but hackers are making good money from reporting vulnerabilities.
ZDNet Security Update: Danny Palmer talks to Europol head of operations Fernando Ruiz about a project that has saved millions of people from paying out after ransomware attacks.
Ransomware group has borrowed a successful technique from another gang that makes it harder to spot when malware is being spread.