The incident was reported to the securities and exchange commission five days after it took place.
Researchers at security company ESET detail Crutch, a malware backdoor implanted onto the systems of a European foreign ministry by the Kremlin-linked Turla hacking group.
Got a pile of old drives that you need to wipe before sending them to Silicon Heaven? Or do you want to wipe a drive in a computer that you are selling or giving away? Here are some tips and tricks to help you get the job done.
GitHub research suggests there is a need to reduce the time between bug detection and fixes.
Personal information belonging to banking customers was compromised.
Ivanti says the deals strengthen the company in the mobile zero-trust security space.
FBI: "The web-based client's forwarding rules often do not sync with the desktop client, limiting the rules' visibility to cyber security administrators."
Virtual private networks aren't essential only for securing your unencrypted Wi-Fi connections in coffee shops and airports. Every remote worker should consider a VPN to stay safe online. Here are your top choices in VPN service providers and how to get set up.
Google is trying to address the reality that smaller organizations are often targeted by cybercriminals.
Some extensions mimicked official apps while others copied popular Chrome extensions.
Cyber criminals are looking to take advantage of the holiday shopping season. That could put personal and corporate data at risk.
Cyber insurance is becoming increasingly popular. But what does it cover, what doesn't it cover and what should you be looking for when deciding on a policy?
'Hacker_R_US' was one of the two members of the Apophis Squad hacker group.
Cryptocurrency exchanges have felt the impact of everything from vulnerability exploit to social engineering scams over this year.
FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.
The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be managed from anywhere you have an internet connection.
The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ports or NFC.
The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have been asking for -- USB-C support.
Transparency in security.
Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion.
Would you like to spend less time unlocking your Android smartphone? Android has you covered.
Quite a few readers have expressed an interest in seeing what's inside a super-secure DataLocker DL3 encrypted hard drive. Well, let's get the screwdrivers out and take a look!
I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download.
External hard drive featuing AES 256-bit XTS mode encryption and a built-in LCD keypad.
Millions of us have adopted smart home and IoT devices, but these products continually prove themselves to be vulnerable endpoints. Here are some of the most noteworthy IoT cyberattack examples of this year.
Time to dump those cheap dollar-store flash drives, or the ones you picked up at a trade show and get a encrypted micro USB SSD that would impress James Bond.
Despite a worldwide pandemic, cyberattackers haven't stopped poking holes in our defenses. These are the worst incidents so far in 2020.
Minut is a noise, temperature, and motion sensor that has been built for privacy that's aimed primarily at the short-term rental market -- think Airbnb, that sort of thing.
These laptops conform to Microsoft’s Windows 10 Secured-core PC requirements and have been tested to meet or exceed MIL-STD-810G standards.
You want my mother's maiden name and the first school I went to? I don't think so...
ZDNet Security Update: Danny Palmer talks to Chester Wisniewski, principal research scientist at Sophos, about one of the most common forms of Android malware and what needs to be done to stop it spreading.
Organisations are paying an average of $1m to cyber criminals to restore their networks after falling victim to ransomware.
A combination of the critical nature of manufacturing plants and security vulnerabilities mean hackers are eyeing up easy pay days - and attacks are on the rise.
ZDNet Security Update: Danny Palmer talks to University of Sussex's Dr. Mona Rashidirad and the University of Auckland's Hamidreza Shahbaznezhad about how too many controls can provide a false sense of security.
Danny Palmer explains how the events of this year have forced organizations and employees to swiftly shift to working from home -- and that's creating security vulnerabilities cyber attackers are exploiting. Read more: https://zd.net/2QVbcyk
Tonya Hall sits down with Neal Dennis, cyber threat intelligence advisor at Cyware, to talk about what it means when hackers share data and why he recommends that companies start sharing data as well within the legal boundaries.
New guidelines from ENISA recommend that all stages of the IoT device lifecycle need to be considered to help ensure devices are secure.
Danny Palmer tells Karen Roby how organizations aren't applying security patches and why that leaves them vulnerable to hackers.
ZDNet Security Update: Danny Palmer talks to James Spiteri, security specialist at Elastic, about how red tape could be holding back cybersecurity and how cyber criminals flourish without it.
Many organisations still haven't applied security patches issued years ago, putting them at risk from common cyberattacks.
Customers will be able to authorise a payment using their fingerprint instead of a PIN number or signature
Austrac has decided not to pursue any further regulatory action against the 'buy now pay later' service.