Microsoft introduces two new Windows APIs to help driver developers create safer software.
New Microsoft Defender ATP service will help weed out unneeded administrator accounts before attackers find them.
The new clipboard access detection and warning feature in iOS 14 exposes another app.
The UK's 'biggest ever' law enforcement operation results in arrest of 746, so far.
Hackers are taking Roblox credentials leaked on Pastebin, accessing accounts, and leaving the same "Ask your parents to vote for Trump this year" message on thousands of Roblox profiles.
Academic study used unique "honeytoken" emails to install Facebook apps and see which inboxes received emails from unrecognized senders.
V Shred defended the public status of its open bucket and only partially solved the problem.
New samples of the ransomware reveal the techniques used to attack critical ICS systems.
Security researchers map out how a ransomware attack plays out over a two week period.
Loot boxes, skins, and other in-game purchases could come under new scrutiny in the UK.
It's a complex accountability tree, but there's no central mechanism allowing a transparent view of where each Commonwealth entity is at with cybersecurity.
A Facebook privacy mechanism blocks apps from receiving user data if users didn't use an app for 90 days. Facebook said 5,000 apps continued to receive user data regardless.
Lookout said it linked APT15 malware to Xi'an Tianhe Defense Technology, a Chinese defense contractor.
ACMA issues its largest fine over five million breaches to a company that made AU$16.5 billion in sales last quarter.
The hacker has attempted to ransom nearly 47% of all MongoDB databases left exposed online.
Quite a few readers have expressed an interest in seeing what's inside a super-secure DataLocker DL3 encrypted hard drive. Well, let's get the screwdrivers out and take a look!
I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download.
External hard drive featuing AES 256-bit XTS mode encryption and a built-in LCD keypad.
Millions of us have adopted smart home and IoT devices, but these products continually prove themselves to be vulnerable endpoints. Here are some of the most noteworthy IoT cyberattack examples of this year.
Time to dump those cheap dollar-store flash drives, or the ones you picked up at a trade show and get a encrypted micro USB SSD that would impress James Bond.
Despite a worldwide pandemic, cyberattackers haven't stopped poking holes in our defenses. These are the worst incidents so far in 2020.
Minut is a noise, temperature, and motion sensor that has been built for privacy that's aimed primarily at the short-term rental market -- think Airbnb, that sort of thing.
These laptops conform to Microsoft’s Windows 10 Secured-core PC requirements and have been tested to meet or exceed MIL-STD-810G standards.
The world's first and currently only FIDO2 Level 2 security key with built-in fingerprint reader.
A list of all the major vulnerabilities that impact Intel processors.
Malware which resists removal to covert spying on locked smartphones -- mobile threats are becoming more complex and dangerous with each year that passes.
Attackers targeted everything from gas pumps to your smart TV this year.
Every night is fright night with what can happen once these scary technologies take hold in ways that you may not have imagined.
All the facts and figures that matter to you and your business from the past month in technology news.
The world’s first Lightning-compatible security key
New research highlights how throwing money indiscriminately at security doesn’t guarantee results.
ZDNet Security Update: Danny Palmer talks to Kelly Rozumalski, secure connected health director at Booz Allen, about the rise of internet connected healthcare and how it's creating more security vulnerabilities which can be exploited by hackers.
Being a victim of cybercrime can be about much more than just the financial losses.
Apple said this week that iOS 14 and macOS 11 will support the DNS-over-HTTPS and DNS-over-TLS protocols.
It's part of the NSW government's AU$240 million commitment to improve the state's cybersecurity capabilities.
Activist group DDoSecrets published data from 200 US police departments and fusion centers on Friday, June 19.
ZDNet Security Update: Danny Palmer talks to Daniel dos Santos, research manager at Forescout, about how insecure connected devices could be putting your network at risk from cyber criminals.
Already one of the most dangerous forms of ransomware, now Sodinokibi looks like it could also be attempting to make money from stolen payment information too.
Security firm identifies 111 malicious Chrome extensions collecting user keystrokes, clipboard content, cookies, more.
Lockdown closed shops and people turned to the internet to buy things - and many found that if an offer is too good to be true, it probably is.
Microsoft brings malware scanning to firmware on Windows 10 PCs.
Void can detect the 'liveness' of a voice.
Facebook files lawsuits against MGP25 Cyberint Services in Spain and against Massroot8 in the US.
Russia's media watchdog Roskomnadzor said Telegram has agreed to help Russian law enforcement fight against extremist and terrorist content shared on its platform.