Private companies running systems of national significance need to hand over information on networks and systems if requested by Home Affairs.
Microsoft says attackers have used a Windows zero-day to spoof file signatures and another RCE in the Internet Explorer scripting engine to execute code on users' devices.
Other E2E chat apps that support encrypted video calls include Signal, WhatsApp, Wickr, and Wire.
New encryption standards TLS 1.3 and DNS-over-HTTPS are sweeping the last crumbs of visible user activity off the enterprise network table. Fail to take any action, and within two years, you'll lose the ability to analyze network traffic and detect the cyberthreats that will endanger your organization.
Giving administrators more control and visibility while enabling external collaboration to occur securely.
Mozilla: "Our pre-COVID plan is no longer workable."
File-encrypting ransomware attacks can take months of planning by gangs. Here's what to look out for.
Proof-of-concept exploit code available in Bash, Python, and Ruby.
One of the most popular password managers, 1Password, is finally releasing a desktop Linux client.
At one point, the group ran almost a quarter of all Tor exit nodes. Group still controls 10% of all Tor exit nodes today.
Troy Hunt has made the decision following an unsuccessful attempt to have the platform acquired.
Warnings about handing over bank credentials to others are general security warnings, not seen as trying to lessen competition.
Sources: Attacks linked to a hacker group known as Fox Kitten (or Parisite), considered Iran's "spear tip" when it comes to cyber-attacks.
This is in addition to the extra personnel that would be required if the Inspector-General of Security's jurisdiction expanded to four more intelligence agencies.
The block was put in place at the end of July and is enforced via China's Great Firewall.
The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have been asking for -- USB-C support.
Transparency in security.
Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion.
Would you like to spend less time unlocking your Android smartphone? Android has you covered.
Quite a few readers have expressed an interest in seeing what's inside a super-secure DataLocker DL3 encrypted hard drive. Well, let's get the screwdrivers out and take a look!
I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download.
External hard drive featuing AES 256-bit XTS mode encryption and a built-in LCD keypad.
Millions of us have adopted smart home and IoT devices, but these products continually prove themselves to be vulnerable endpoints. Here are some of the most noteworthy IoT cyberattack examples of this year.
Time to dump those cheap dollar-store flash drives, or the ones you picked up at a trade show and get a encrypted micro USB SSD that would impress James Bond.
Despite a worldwide pandemic, cyberattackers haven't stopped poking holes in our defenses. These are the worst incidents so far in 2020.
Minut is a noise, temperature, and motion sensor that has been built for privacy that's aimed primarily at the short-term rental market -- think Airbnb, that sort of thing.
These laptops conform to Microsoft’s Windows 10 Secured-core PC requirements and have been tested to meet or exceed MIL-STD-810G standards.
The world's first and currently only FIDO2 Level 2 security key with built-in fingerprint reader.
A list of all the major vulnerabilities that impact Intel processors.
Malware which resists removal to covert spying on locked smartphones -- mobile threats are becoming more complex and dangerous with each year that passes.
With the government's Cloud Services Certification Program now shuttered, Commonwealth entities will be required to perform their own due diligence when procuring cloud services.
As health continues to hold crown as most breached sector in Australia.
ZDNet Security Update: Danny Palmer talks to Bugcrowd's Anna Westelius about what it takes to work in the field of information security and why more diversity is needed to drive the industry forward.
Black Hat 2020: A researcher at Oxford University has demonstrated how he could gain access to sensitive information on corporate networks by targeting traffic being transmitted by satellites.
Researchers discovered a way to steal the personal and sensitive data of users on the popular dating app.
Cyber-security firm McAfee publishes details about "Operation North Star."
Research shows that smartphone usage patterns can reveal four of the five key personality traits.
ZDNet Security Update: Danny Palmer talks to Rafe Pilling, senior security researcher at Secureworks, about the rise of state-backed cyber attacks coming out of Iran and how to protect your network from falling victim.
QSnatch malware, first spotted in late 2019, has grown from 7,000 bots to more than 62,000, according to a joint US CISA and UK NCSC security alert.
It's also trialling a digital identity solution with Australia Post.
Following two separate incidents, the FBI is now warning US companies about backdoors in Chinese tax software.
Cyber criminals are targeting sports teams, leagues and organisational bodies – and in many cases, their attacks are successful, warns the NCSC.
The new dashboard will allow companies to monitor security and enforce compliance across their workloads.