Michael Coates, CEO & Co-Founder of Altitude Networks and the former CISO at Twitter, share best practices for building strong security teams and for starting a career in cybersecurity.
Exclusive: Amazon, Google fail to address security loopholes in Alexa and Home devices more than a year after first reports.
US Air Force switches to secure solid-state-based solution to replace antiquated floppy disks in SACCS nuclear weapons management system.
While blockchain solutions are maturing, most business and technology decision makers are unclear as to how blockchain can deliver actual business value to their organization.
Would you trust a robot more than your manager? A new global study found that the majority of workers most definitely would.
New free decrypter can help victims decrypt 148 of the 160 versions of the STOP ransomware.
Organisations are aware about the damage customer data being hacked can do - but a new report suggests they underestimate the risks associated with business data being compromised.
Samsung promises software patch next week; recommends not using custom screen covers in the meantime.
Google's case is similar to 19 years ago -- when Microsoft was found guilty of exclusionary conduct
£36 million in funding has been handed over to protect business technologies.
Sky-high rates of return were promised to participants.
Microsoft urges organizations to avoid installing KB4520062 because it could stall Defender antivirus services.
Dark Web traders may find the cryptocurrency intended for purchases ending up in the hands of cyberattackers.
Credit card and payment information was the target of the three-year-long attack.
Samsung has promised to provide a software update to fix the glaring security issue that allows users to bypass the fingerprint reader through using third-party screen protectors.
For the past few years, the FBI has been keeping a separate list of the US' most wanted cybercriminals. Time to take a look at who's still on it -- in no particular order.
Your iPhone and iPad is likely packed with important, valuable, and even sensitive information that you might not want others to be able to access. Here are the steps you should take to lock down an iPhone or iPad running iOS 12.3.
Your iPhone and iPad is likely packed with important, valuable, and even sensitive information that you might not want others to be able to access. Here are the steps you should take to lock down an iPhone or iPad running iOS 12.2.
What would a modern-day Plague of Lice look like?
The technology managing the systems in our cars could be open drivers up to the risk of hacking. Find out the most common digital threats to our cars, and how you can reduce your risk.
This gallery contains a list of the technologies that have been many times at the heart of a large number of data breaches incidents in the past few years.
Time and time again, Facebook has been slammed for privacy practices and data handling. Here are some of the most prominent, recent scandals of note.
Whether you're in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. One of these could be your best bet.
Although hackers are getting more and more sophisticated, you can still recognize that something is not right online. NordVPN shares tips on spotting a phishing message -- and keep your online activities safe.
Bypassing passcodes, malware-laden apps, and inherent design flaws exposing almost all known mobile devices made up part of the security problems found in iOS and Android.
Experts weigh in on what they believe will happen to the world of cybercrime, malware, and botnets in the coming year.
If you're looking for a fast, ultra-rugged, secure encrypted portable storage drive that's available in both HDD and SSD flavors, look no further than Apricorn's new Aegis Fortress L3.
Your iPhone and iPad is likely packed with important, valuable, and even sensitive information that you might not want others to be able to access. Here are the steps you should take to lock down an iPhone or iPad running iOS 12.1.
Voice assistants like Google Home, Amazon Alexa, and Samsung smart TVs are always listening, yet consumers are unaware that their recordings are held online. Here are some ways to mange your privacy around these devices.
Millions of records were lost, services were disrupted, and credit card data was stolen as hackers ran amok over the year.
Tonya Hall sits down with Ian Barlow, Do Not Call program coordinator at The Federal Trade Commission, to talk more about how he is going about enforcing the Do Not Call program and the technology behind it.
Fifteen US school districts, accounting for 100 schools, were hit in the past two weeks alone.
Advertisers running campaigns on social or political issues in the country now must confirm their identity and location as Facebook looks to stem misinformation.
The company allegedly collected and stored biometric data without user consent.
Announced during D61+ Live, the joint research project will use Data61's AI research to create "cyber traps" and "decoys".
Cyber attackers infected 800,000 users with banking information stealing malware – but mistakes have allowed researchers to look behind the scenes of a successful hacking campaign.
If you're on Fortinet, Palo Alto, Pulse Secure, patch now, warns UK spy agency
The FBI is urging all ransomware victims to tell it about the attack whether they choose to pay or not.
Driver’s licence numbers of approximately 100,000 ‘Dashers’ were also accessed.
By compromising emails between vendors and their clients, scammers can produce exact replicas of expected invoices - and funnel the funds into their own wallets.
Here's how to remove yourself from the Internet and hide your identity. Read more: https://zd.net/2Vq4DWE
The non-profit organisation that will be based in Switzerland aims to protect victims against cyberattacks and assist them in the aftermath.
Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.
An ideal backup tool for small businesses and larger enterprises alike, vmProtect 6 makes light work of protecting and rapidly recovering virtual machines on VMware vSphere hosts.
<p> King of the small business security market, <a href="http://www.sonicwall.com/uk">SonicWALL</a> recently added six new models to its popular <a href="http://www.sonicwall.com/uk/TZ_Series.html">TZ</a> range of UTM (Unified Threat Management) appliances, delivering a mix of enhanced functionality and improved performance. Designed to serve the one-man-band upwards, the new range is topped out by the TZ 210 which, as we discovered, neatly bridges the gap between SME and enterprise products — and at a price that the competition will find hard to match. </p>
McAfee Internet Security 2009 does a reasonable job, but it also leaves room for improvement.
As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.
Symantec Backup Exec System Recovery 8 provides flexibility when creating desktop and laptop backups. If you have high value data stored on your computer, then we think $106.53 is a reasonable price to ensure it's protected.
Symantec Backup Exec 12 allows complete system recovery and concentrates on continuous file/data protection. Though AU$1,795 may seem a lot of money for an application, Backup Exec might be worth the investment if you're using it for irreplaceable and highly valuable data.
Lavasoft Ad-Aware 2007 came in dead last in our CNET antispyware testing. Ad-Aware failed to detect half of the test spyware, and unlike nine out of the 10 other antispyware apps we reviewed in December 2007, left behind traces for all but one spyware.