How do you configure Windows 10 PCs to avoid common security problems? There's no software magic bullet, unfortunately, and the tools are different for small businesses and enterprises. Here's what to watch out for.
Your name, your favorite football team and your favourite band: The UK's National Cyber Security Centre has released a list of the 100,000 most common passwords to appear in data breaches in an effort to encourage users to select strong passwords.
Russian Twitter bot activity went up by 286 percent shortly after the release of the Mueller Report.
The Weather Channel IT staff dealt with the ransomware infection by restoring impacted computers from backups.
WannaCry hero faces up to ten years in a US prison.
PayPal engineer develops novel approach to detecting and stopping ransomware attacks.
French government open-sources in-house-made end-to-end encryption IM app named Tchap.
Prices for stolen Indian payment cards has also gone up by 150% in 2018 to around $17/card.
Last month, Facebook admitted to storing plaintext passwords for hundreds of millions of Facebook accounts.
What do internet trends like the 10-year challenge threaten have to do with security? Your personal data. As consumer technology continues to transform our lives, we must take proactive steps to ensure individuals and organizations alike are secure.
768k Day expected within the month, reminiscent of 512k Day when AT&T, BT, Comcast, Sprint, and Verizon all went down.
Updated: The bug was accepted as valid, but the researcher wasn’t paid.
The “unintentional uploads” have taken place since 2016.
Services have been temporarily paused in Chicago to investigate the incident.
What would a modern-day Plague of Lice look like?
If you want to beef up the security on your Google Account, then the Advanced Protection Program those at risk of targeted attacks – such as journalists, activists, business leaders, and political campaign teams – is for you. Here's how to enable the Google Advanced Protection Program.
The technology managing the systems in our cars could be open drivers up to the risk of hacking. Find out the most common digital threats to our cars, and how you can reduce your risk.
This gallery contains a list of the technologies that have been many times at the heart of a large number of data breaches incidents in the past few years.
Time and time again, Facebook has been slammed for privacy practices and data handling. Here are some of the most prominent, recent scandals of note.
Whether you're in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. One of these could be your best bet.
Although hackers are getting more and more sophisticated, you can still recognize that something is not right online. NordVPN shares tips on spotting a phishing message -- and keep your online activities safe.
Bypassing passcodes, malware-laden apps, and inherent design flaws exposing almost all known mobile devices made up part of the security problems found in iOS and Android.
Experts weigh in on what they believe will happen to the world of cybercrime, malware, and botnets in the coming year.
If you're looking for a fast, ultra-rugged, secure encrypted portable storage drive that's available in both HDD and SSD flavors, look no further than Apricorn's new Aegis Fortress L3.
Your iPhone and iPad is likely packed with important, valuable, and even sensitive information that you might not want others to be able to access. Here are the steps you should take to lock down an iPhone or iPad running iOS 12.1.
Voice assistants like Google Home, Amazon Alexa, and Samsung smart TVs are always listening, yet consumers are unaware that their recordings are held online. Here are some ways to mange your privacy around these devices.
Millions of records were lost, services were disrupted, and credit card data was stolen as hackers ran amok over the year.
Concerned about the security of the data you store on your iPhone and iPad? Here are the steps you should take to lock down an iPhone or iPad running iOS 12. (Updated for iOS 12.1)
Researchers have demonstrated everything from running cars off the road to remotely controlling your brakes.
Mozilla sets out Firefox's upcoming protections against cryptojacking and fingerprint scripts, plus its rollout plans.
A new case of suspected Chinese industrial espionage highlights Europe's tricky balancing act between exploiting opportunities in China and guarding against the theft of technology back home.
Google rolled out MTA-STS and TLS Reporting support for Gmail servers on April 10, 2019.
TechRepublic's Karen Roby sits down wit ZDNet's Danny Palmer to learn more about how cyber criminals are stealing children's data and what parents can be doing to prevent their child from becoming a victim. Read more: https://zd.net/2DiR6rT
It uses laptops to collect data on students' hand gestures, eye movements through webcams, as well as mouse, keyboard, and digital pen movements to better understand the link between behaviour patterns and learning outcomes.
Colin Ahern, deputy CISO for the city of New York, explains why and how NYC Cyber Command built a data pipeline that processes events in less than 10 milliseconds.
Researchers at Cisco Talos uncover 74 Facebook groups being used for illicit activity by hundreds of thousands of users. Read more: https://zd.net/2FWAerh
It is unusual for such malware to be found on infrastructure hosted in the US.
Penetration testers testing university networks were able to use phishing emails to gain administrator access and access personal data, financial information and confidential research.
The perpetrators allegedly scammed $18.7 million from the elderly and retirees.
Firefox will gain support for the legacy secure sign-in standard FIDO U2F in upcoming releases.
If the legislation is passed, social media platforms may be ordered by government to disable accounts spreading fake news.
Opinion: No consent required from family members impacted by your decision, of course. Read more: https://zd.net/2IcxASb
Newly identified Xwo malware could be laying the groundwork for far more damaging cyberattacks around the globe, warn researchers.