It was the company’s first formal annual meeting with Wall Street analysts since its split from Symantec in 2019.
A ransomware attack hit a major US pipeline this weekend, leading to a shut down in operations for the past three days. Critical infrastructure and pieces of the supply chain (already fragile due to the pandemic) continue to be taken down by ransomware attacks, either advertently or inadvertently.
Faxton St. Luke’s Healthcare in New York, Randolph, VT-based Gifford Health Care and Thrifty Drug Stores are just a few of the victims.
The group's existence is tied to a murky web of shorted stocks, criminality, and failed attempts to appear as Robin Hood.
Meanwhile, the hacker group DarkSide said a statement that its goal is "to make money, and not creating problems for society".
Updated: Everything you need to know about ransomware: how it started, why it's booming, how to protect against it.
One of Europe’s biggest insurers is now suspending policies in France that reimburse victims for ransomware payments.
Active Cyber Defence takes action against scammers attempting to take advantage of Covid-19 pandemic - and did so with some help from the general public.
Over 10 billion suspect listings were also wiped out during the year in a counterfeit crackdown.
Fake TLDs are now also being created to maximize the potential success of attacks.
Tankers given special permission to carry fuel to counter supply shortages due to shutdown of Colonial Pipeline.
Zeus, SpyEye, Citadel, and the Blackhole exploit kit were among the strains stored through the host.
The Department of Parliamentary Services has said its systems were not down because of an attack, but because it took systems offline to protect them.
In the second week of Apple's app tracking transparency tool going live, only 13% of global iOS users have agreed, Flurry Analytics has reported.
The threat of ransomware is not just to computer systems, but to the physical world, too.
This is the ultimate security key for professionals.
Durable, fully reversible connectors, encapsulated in epoxy resin, and with updatable firmware.
I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download.
FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.
The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be managed from anywhere you have an internet connection.
The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ports or NFC.
The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have been asking for -- USB-C support.
Transparency in security.
Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion.
Would you like to spend less time unlocking your Android smartphone? Android has you covered.
Quite a few readers have expressed an interest in seeing what's inside a super-secure DataLocker DL3 encrypted hard drive. Well, let's get the screwdrivers out and take a look!
External hard drive featuing AES 256-bit XTS mode encryption and a built-in LCD keypad.
Millions of us have adopted smart home and IoT devices, but these products continually prove themselves to be vulnerable endpoints. Here are some of the most noteworthy IoT cyberattack examples of this year.
Time to dump those cheap dollar-store flash drives, or the ones you picked up at a trade show and get a encrypted micro USB SSD that would impress James Bond.
Despite a worldwide pandemic, cyberattackers haven't stopped poking holes in our defenses. These are the worst incidents so far in 2020.
Danny Palmer tells Karen Roby about why DDoS attacks are such a popular method of causing online disruption. Read more: https://zd.net/2SvRpKu
Indue's AU$70 million contract is in addition to the AU$33 million Services Australia is using to rollout the welfare quarantining scheme.
ZDNet Security Update: Danny Palmer talks to Dr. Margaret Cunningham, Principal Research Scientist at Forcepoint, about how to balance keeping the network safe from cyber threats with keeping employees happy.
'10s of organisations' have spotted Microsoft Exchange vulnerability indicators on their systems, according to the Australian Cyber Security Centre.
Firefox's SmartBlock aims to bolster the browser's built-in content blocking feature, which blocks third-party scripts, images, and other content from being loaded from cross-site tracking companies reported by Disconnect.
Ayelet Biger-Levin, VP at BioCatch, talks to Tonya Hall about how the speed at which one fills a credit card application can help identify a fraudster.
Dependencies on just-in-time supply chains and sometimes out-of-date technology makes shipping and logistics an ever-more tempting target for cyber criminals.
Danny Palmer tells how Karen Roby a court order allowed the FBI to go into networks and remove web shells used by hackers -- and how some people aren't happy about that. Read more: https://zd.net/2PupRnC
New plans designed to protect IoT devices from cyberattacks will ban default passwords and require manufacturers to tell users how long smart devices - including phones - will receive security updates for.
ZDNet Security Update: Danny Palmer talks to Yuelin Li, VP of strategy and development at Onfido, about how cyber criminals are exploiting the rise in our online activity for fraud and how to avoid becoming a victim.
Apple’s latest update brings a new privacy feature, a workaround for using Face ID with a face mask, and other improvements. Read more: https://zd.net/3sSAXQX
Chip giant will participate in DARPA's DPRIVE program that aims to develop an accelerator for fully homomorphic encryption.
Monetary Authority of Singapore outlines key security and operational risks financial institutions face as remote work practices take hold, including outsourcing and staff conduct, and what these organisations should do to mitigate such risks.