According to a new study, one in 10 people believe someone could guess their password by looking through their social media.
It didn't take long for CVE-2021-26084 to be added to exploit kits.
Researchers were able to exploit a protocol design feature on a vast scale.
A report warns about a rise in DDoS attacks as cyber criminals get more creative with ways to make campaigns more disruptive.
A phishing operation hides in plain sight and turns credential theft into a consumer product.
Once again, if a malicious actor can hit port 443 on vCenter Server, it's goodnight nurse.
A non-government organisation says internet freedom globally has deteriorated as more countries have pursued new rules for tech companies on content, data, or competition over the past year.
Various attempts will be made in the browser to make memory handling safer.
A government review into the Zoom-Five9 deal will result in the deal's application for approval being halted for the time being.
According to FYEO, "chicken1" was used over 10 times by employees at the company.
Russia-based cryptocurrency exchange Suex was sanctioned for its role in facilitating massive ransomware transactions.
More than half of all respondents said they used a public cloud, a 5% bump compared to 2019, and 21% additionally said they deploy multiple public clouds.
Nearly 80% of respondents to a Ping Identity survey said they have abandoned or stopped creating an online account for a variety of reasons.
Nutanix is launching AOS version 6, Nutanix Era and other new tools to help customers manage data and build out software-defined data centers.
The researchers found that when a ripple event triggers a loss of income, it can lead to losses of $36 million per event.
Everyhting you need to know about iOS and iPadOS securoty, all in one place.
This is the ultimate security key for professionals.
Durable, fully reversible connectors, encapsulated in epoxy resin, and with updatable firmware.
I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download.
FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.
The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be managed from anywhere you have an internet connection.
The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ports or NFC.
The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have been asking for -- USB-C support.
Transparency in security.
Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion.
Would you like to spend less time unlocking your Android smartphone? Android has you covered.
Quite a few readers have expressed an interest in seeing what's inside a super-secure DataLocker DL3 encrypted hard drive. Well, let's get the screwdrivers out and take a look!
External hard drive featuing AES 256-bit XTS mode encryption and a built-in LCD keypad.
Millions of us have adopted smart home and IoT devices, but these products continually prove themselves to be vulnerable endpoints. Here are some of the most noteworthy IoT cyberattack examples of this year.
Time to dump those cheap dollar-store flash drives, or the ones you picked up at a trade show and get a encrypted micro USB SSD that would impress James Bond.
Tonya Hall asks Richard Hummel, manager at Netscout, about the latest cyberattack trends and why the number has skyrocketed.
Tonya Hall talks to Dr. Sridhar Ramaswamy, CEO and Co-founder at Neeva, about how a subscription-based search engine protects users' privacy and deliver better results.
Daphné Leprince-Ringuet says quantum computers are a major threat to security protocols, but Verizon claims this 'quantum-safe' VPN is future-proof. Read more: https://zd.net/3hyWPOi
ZDNet Security Update: Danny Palmer talks to the Alan Turing Institute's Prof. Carsten Maple about the increased use of digital identity systems such as vaccine passports -- and what's required to make them trustworthy and secure.
Danny Palmer tells Beth Mauder about three things you should be doing to keep your online accounts secure from cyber criminals. Read more: https://zd.net/3njaVr4
ZDNet Security Update: Danny Palmer talks to John Donovan, CISO at Malwarebytes about the impact stress has on information security teams and how to help improve well-being of employees.
Danny Palmer tells Beth Mauder about LockBit ransomware and how aggressive new techniques mean it's becoming a potent cyber threat. Read more: https://zd.net/3Btcs1n
ZDNet sits down with Surfshark's CMO, Regimantas Urbanas, to learn more about what Surfshark offers that other VPNs do not, general VPN usage tips, and how the company looks to attract new and experienced VPN users. Read more: https://zd.net/3ynvR1J
Tonya Hall asks Dr. Ron Ross, computer scientist and fellow at NIST, what does a security by design mindset imply for companies.
ZDNet Security Update: Danny Palmer talks to Theresa Payton, CEO of Fortalice Solutions and former CIO at The White House, about the problem of ransomware and the disruption it could cause if we don't act now.
Tonya Hall interviews Adam Flatley, director of threat intelligence at Redacted Inc., about the options businesses have when facing a ransomware attack.
ZDNet sits down with ExpressVPN's chief architect, Peter Membrey, to learn about some of the new features available on Lightway, what ExpressVPN offers as a service, and why individuals need to be using a VPN when they're online. Read more: https://zd.net/3yUG0nT
ZDNet Security Update: Danny Palmer talks to John Hultquist, VP of analysis at Mandiant Threat Intelligence, about ransomware attacks and how to fight back against cyber criminals.