The best VPN 2024

The Best VPS 2024

The Best C# Book

Security

March 23, 2018byEileen BrowninMobility

Too many companies are taking a short term view when it comes to security.

Some businesses would rather pay ransom that invest in cybersecurity, survey finds

A common navigation system used in the maritime industry could be exploited to cause chaos, a researcher has warned.

Many of us no longer trust Facebook. Were wary of sharing data — in case it is used by third parties without our knowledge. So, what features will the social media platform of the future need to regain our confidence?

June 7, 2018byCharlie OsborneinSecurity

May 7, 2018byAdrian Kingsley-HughesinStorage

The bug had a rare 9.8 out of 10 score on the common vulnerability severity rating scale.

The Commonwealth Bank of Australia has once again found itself in the spotlight for the potential mishandling of customer information.

July 14, 2008byMichael PalamountaininSecurity

January 11, 2018byEileen BrowninSocial Enterprise

An ideal backup tool for small businesses and larger enterprises alike, vmProtect 6 makes light work of protecting and rapidly recovering virtual machines on VMware vSphere hosts.

Lets face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software – we all do – you need to keep tabs on the latest vulnerabilities.

2 days agobyZack WhittakerinSecurity

Weve written a lot about blockchain, but if you dont understand it all then at least remember these two points.

24 internet-connected things that really shouldnt be online

Whether youre in the office or on the road, a VPN is still one of the best ways to protect yourself on the big, bad internet. One of these could be your best bet.

February 14, 2018byZDNet EditorsinInnovation

This isnt the cheapest connected camera on the market, but Netgears Arlo Pro packs a good range of features from a siren to a rechargeable battery.

Citing Russian cyber attacks and WannaCry, ex-GCHQ director Robert Hannigan says nation-state campaigns have become a problem for everybody

June 4, 2018byZDNet EditorsinSecurity

Ive owned countless USB flash drives over the years, but none come close to being as cool – or as useful – as the Aegis Secure Key 3z with built-in hardware-based encryption.

2 days agobyCharlie OsborneinSecurity

Carbon Black research suggests that as interest in cryptocurrency rises, so does the market for weapons to steal it.

July 10, 2017byManek DubashinSecurity

One of the key requirements of the newly enacted GDPR is a demonstrated effort to enforce security measures that safeguard customer data. This bundle includes six policies you can customize and implement…

Ransomware, stolen data or malware: How do online crooks really make their money?

After a number of high-profile scandals and security failures, trust in tech companies and the internet is on the slide. Rebuilding it will be a big challenge.

December 13, 2017byJoal RyaninSecurity

Gmail spam mystery: Why have secure accounts started spamming themselves?

Project Maven: Google backs off Pentagon drone AI project

April 18, 2017byMary BranscombeinSecurity

February 27, 2018byMary BranscombeinStorage

Google wont bid to renew its Project Maven contract with the Pentagon after it expires in 2019.

From the tech giants that let fake news run amok, to the ridesharing company that had an Uber-bad run, these were the years most notable disappointments.

3 days agobyCharlie OsborneinSecurity

Vital internet hub, De-Cix in Frankfurt, has lost its fight against German intelligence services mass surveillance.

Everybody knows that 12345 is a bad password. But what theyre using instead isnt much stronger

November 26, 2008byMichael PalamountaininSecurity

Chrome, Firefox CSS3 flaw may have let attackers grab Facebook user data

February 25, 2018byDavid GewirtzinSecurity

If you are concerned about Facebook playing fast and loose with your personal data, here are a few other social networks you can try.

January 29, 2018byLeslie GornsteininCloud

Symantec Backup Exec System Recovery 8 provides flexibility when creating desktop and laptop backups. If you have high value data stored on your computer, then we think $106.53 is a reasonable price to ensure its protected.

August 22, 2008byMichael PalamountaininSecurity

January 10, 2008byRobert VamosiinSecurity

As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.

A two-factor code used to reset an account password could be easily bypassed.

October 25, 2014byZack WhittakerinSecurity

A roundup of some of the more bizarre things that are online — but really shouldnt be.

Googles Project Zero exposes unpatched Windows 10 lockdown bypass

Dozens of data breaches, millions of people affected.

June 5, 2018byZDNet EditorsinSecurity

Financial information is thought to be safe.

Where lawmakers failed to reform, the tech industry stepped up.

April 7, 2018byEileen BrowninSocial Enterprise

December 18, 2017byZack WhittakerinSecurity

Samsung beats consumer advocates in case over smartphone security updates.

This SSL VPN appliance suffers from an awkward admin interface and depends on ActiveX for some functionality, but its still a relatively simple way to provide remote access to network applications.

The vulnerability allowed attackers to circumvent the reCAPTCHA bot protection system.

CrowdStrike offers up to $1 million if customer data breached

Miscreants have tampered with the service to pump out spam and tell you that every IP address you check is suspicious.

April 10, 2018byJake SmithinSocial Enterprise

June 4, 2018byZDNet EditorsinSecurity

Windows warning: Tech-support scammers are ramping up attacks, says Microsoft

Rebooting your router is no longer enough to thwart VPNFilters brunt, Cisco Talos reports.

If you suspect that Facebook knows far too much about you, configure these security and privacy settings to send Facebook only the information you want to send.

May 16, 2018byAdrian Kingsley-HughesinStorage

Centennial Lawyers is considering launching a class action lawsuit against the HR SaaS provider after it suffered a malware attack and possible resulting data breach.

A single bug hunter is vastly improving the EOS blockchain system — and cashing in at the same time.

McAfee Internet Security 2009 does a reasonable job, but it also leaves room for improvement.

Botnets and DDoS attacks continue to grow in scale. Tackling them is no easy task.

June 6, 2018byZack WhittakerinSecurity

The Amazon Cloud Cam isnt just for Amazons new delivery service, Key. The Cloud Cam is more affordable than most high-end indoor security cameras and gets the job done just as well.

June 4, 2018byZDNet EditorsinSecurity

May 11, 2018byMark SamuelsinDigital Transformation

Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.

June 1, 2018byZDNet EditorsinSecurity

Five years after Snowden revelations, whats changed?

SonicWALLs feature-packed TZ 210 gateway security appliance is capable of protecting all kinds of networks at a very affordable price. Its easy to setup and manage, and sets a new price point in the UTM market.

Want to protect the data you carry around? Check out iStorages encrypted SSD and USB thumb drives with PIN pad access.

Where lawmakers failed to reform, the tech industry stepped up.

The company is confident enough in its security products that CrowdStrike has put its money where its mouth is.

June 1, 2018byZDNet EditorsinSecurity

Lavasoft Ad-Aware 2007 came in dead last in our CNET antispyware testing. Ad-Aware failed to detect half of the test spyware, and unlike nine out of the 10 other antispyware apps we reviewed in December 2007, left behind traces for all but one spyware.

New federal report makes recommendations on how organizations should defend against threats.

June 5, 2018byZDNet EditorsinSecurity

October 15, 2009byAlan StevensinSecurity

April 30, 2018byManek DubashinHardware

We simply dont need to weaken encryption in order to get what we need, says cyber security minister Angus Taylor, but trust in our civilisation is crumbling.

In a statement posted on the Ticketfly landing page, the company said that recent issues led the firm to believe that it is the target of a cyber incident.

June 6, 2018byZDNet EditorsinSecurity

May 31, 2018byZDNet EditorsinSecurity

Reolinks second-generation Argus security camera adds colour night vision, a rechargeable battery, weatherproofing skins, and the promise of cloud storage.

September 11, 2007byJonathan BennettinSecurity

This versatile and reasonably-priced IP65-rated camera is suitable for small businesses as well as homes.

Adobe issues security update for critical zero-day Flash Player flaw that attackers are exploiting via Excel docs.

Securing sensitive data stored on external hard drives is usually a minefield, especially if you are looking for cross-platform compatibility. The Apricorn USB 3.0 Aegis Padlock DT drive is the solution to this problem.

12 graphs which explain the tech news of the last month.

April 21, 2018byRoss RubininSecurity

January 23, 2012byAlan StevensinSecurity

Symantec Backup Exec 12 allows complete system recovery and concentrates on continuous file/data protection. Though AU$1,795 may seem a lot of money for an application, Backup Exec might be worth the investment if youre using it for irreplaceable and highly valuable data.

From todays rock stars of innovation to tomorrows hidden gems, these 18 technologies have the greatest potential to transform the world over the next decade.

Google says its about to update its sign-in page because of Material Design.

July 14, 2008byMichael PalamountaininSecurity

The trading app startups team woke up to find an alleged threat actor had rinsed the Taylor fund pool.

Many now think that passwords cannot secure their PCs and phones, so how will we gain access to our devices in the near future?

December 2, 2017byJason CiprianiinAmazon

May 31, 2018byZack WhittakerinSecurity

June 16, 2017byCharlie OsborneinInternet of Things

Security alert: Watch out for password-stealing malware says FBI.

June 6, 2018byCharlie OsborneinSecurity

June 1, 2018byJason HinerinBlockchain

Are you looking for ways to make your home smarter and safer? Then check out these hand-picked smart home product suites. Theyre expansive, easy to use, and overall good options if you dont know where to start.

Facebook has rolled out new settings to appease users after the Cambridge Analytica scandal. Heres what you need to know.

3 days agobyZack WhittakerinSecurity

Leave a Comment