2015's biggest security breaches: CVS, Anthem, IRS, and worse
Sirin Labs launches ultra-secure, ultra-expensive Solarin smartphone
It's the 'best' and 'most secure' phone ever made, its maker claims.
Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
It's the 'best' and 'most secure' phone ever made, its maker claims.
Password theft should lead victims to change credentials they re-used for other sites.
The case reverses a decision from last year — which may push the case into the hands of the Supreme Court.
Researchers said bloatware punches a massive hole in most out-of-the-box PCs, thanks to flaw-ridden preinstalled software.
Microsoft has made over its Ventures group, and plans to use it to make early-stage investments in cloud, security and machine-learning startups.
The two vulnerabilities can be used to escalate privileges and remotely attack user devices.
This checklist will help you find the safest route to governing appropriate access to sensitive data, apps, and processes. You can print the list or use it in electronic form.
The serious vulnerabilities impact Samsung's Knox security sandbox.
It has been reported by the head of a government-appointed panel investigating the February heist that insiders from Bangladesh Bank may have been involved.
The decade-old appliances can't be patched, despite being in widespread use.
An investigation into the extent of NSW TrainLink's online reservation system security breach is currently underway.
Optus Business and Macquarie University will establish a cybersecurity hub that will focus on three topic areas: Computing and IT, business and economics, and security studies and criminology.
The bill would have effectively outlawed end-to-end encryption, critics argued.
Anyone with the hard-coded credentials can obtain and modify sensitive patient data — many of which are about to, or have recently been in surgery.
Are you clued up on this week's news?
Two-factor authentication is no longer an optional feature. If you use modern cloud services, this extra layer of security can dramatically reduce the risk of a hostile takeover. Here's how to get started.
The story of how Bletchley Park codebreakers decrypted top secret Nazi communications
All Android devices are different, but they all come with some basic security and privacy features. Here are the important tweaks to get started.
One of the new features that Apple rolled out with iOS 9.3 is the ability to password-protect Notes you create. But it's not immediately clear how to do this. But once you know how, it's simple.
Interested in hacking and cybersecurity? Let's get started.
If the Internet is built into everything you own, none of it will be truly safe from hackers.
While cloud backups are quick and easy, if you want total control over your iPhone or iPad backups, the only way to do it is to make encrypted local backups. Here's how to do just that.
What apps, gadgets and accessories can help you protect your smartphones, tablets and laptops on the move?
Opinion: The FBI's attempt to order Apple to help them crack an iPhone has brought out the hysterical in many of us.
Here's a look at some of the devices, platforms and technology US President Barack Obama uses to carry out his day-to-day presidential duties.
Data breaches, hacks, and vulnerable software makes it easier than ever for a hacker to get access to your data. These simple steps can help mitigate it happening in the first place.
Updated: Almost every American has been affected by at least one data breach this year.
Meet some of the best security and privacy gadgets at this year's CES 2016 tech expo.
A look back at the hot topics, major deals, and the technological breakthroughs of the year -- from security to product launches, and the year's successes and catastrophes.
Updated: Before you do anything on your new iPhone or iPad, you should lock it down. Here are the important tweaks you need to protect your privacy.
Buying on a budget? These gadgets are the very best on the market for their price.
Ransomware is occurring with greater frequency, but some basic infosec hygiene can keep you safe.
Forcing users to think up new passwords too often could make you less secure, not more.
Making a good smartphone choice could be the difference between being hacked and keeping your data safe.
If you want to ensure your organization has the best chance of staying secure, you'll want people with experience going on the offense.
Sidney Fernandes, University of South Florida System's CIO emphasizes the importance of baking security into the early stage of your cloud deployment planning.
In an interview with ZDNet, Pulse Secure VP of Strategy Kevin Sapp talks about the importance of fundamentals, like passwords and access control, for keeping networks secure.
In an interview with ZDNet, Texas A&M University System CISO Danny Miller shares his strategy for balancing security training with technology and how public disclosure can actually improve security awareness.
ZDNet interviewed Danny Miller, Texas A&M University System, CISO about the biggest security challenges facing his organization and the lessons he would share with other IT leaders.
IT leaders and cybersecurity experts share advice and best practices for protecting your networks and data from today's security threats.
Here's the best way to keep Android devices secure, and what you do when they've come to the end of their lives.
A video tour of the portable tech I use on a daily basis, along with some discussion of the modifications I have made to them to make them better suited to the task.
If you think the government cannot get its hands all over your personal data, then think again.
As big data, the internet of things, and social media spread their wings, they bring new challenges to information security and user privacy. We examine the new challenges and how companies can best deal with them.
Greens communications spokesperson Scott Ludlam believes making Foxtel-exclusive content available on other platforms is the best method to reduce copyright infringement in Australia.
To complement its completely wireless, battery-powered Arlo cameras, Netgear has launched an HD networked security camera that adds more features, but needs a power connection.
Calling this a "privacy" phone is a stretch, but it has some redeeming features. A keyboard for one, and Android for another.
This tank-like tablet has a durable design, allowing it to withstand some of the toughest climates.
Meet the latest iteration of the secure and privacy-centric Android-based smartphone.
Netatmo's Welcome is a clever HD security camera with a key selling point in the form of its face recognition technology. Upcoming motion-sensing tags will deliver extra security functionality.
Seen too many dubious security-in-a-box solutions? USB armory is the real deal for anyone looking to protect and control their personal digital privacy and security. But is this real deal ready for regular users?
Plenty of connected cameras are suitable for monitoring your home or office, but Netgear's new Arlo is completely wireless and comfortably waterproof, with infrared built in for night and dark areas. It's increasingly extensible too.
Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.
An ideal backup tool for small businesses and larger enterprises alike, vmProtect 6 makes light work of protecting and rapidly recovering virtual machines on VMware vSphere hosts.
SonicWALL's feature-packed TZ 210 gateway security appliance is capable of protecting all kinds of networks at a very affordable price. It's easy to setup and manage, and sets a new price point in the UTM market.
McAfee Internet Security 2009 does a reasonable job, but it also leaves room for improvement.
As a tool for cleaning an untidy Windows registry, PC Tools Desktop Maestro seems to do a good job, and combines this ability with excellent privacy tools. However, users of Windows Vista may find Desktop Maestro being blocked by User Account Control.
Symantec Backup Exec System Recovery 8 provides flexibility when creating desktop and laptop backups. If you have high value data stored on your computer, then we think $106.53 is a reasonable price to ensure it's protected.
Symantec Backup Exec 12 allows complete system recovery and concentrates on continuous file/data protection. Though AU$1,795 may seem a lot of money for an application, Backup Exec might be worth the investment if you're using it for irreplaceable and highly valuable data.
Lavasoft Ad-Aware 2007 came in dead last in our CNET antispyware testing. Ad-Aware failed to detect half of the test spyware, and unlike nine out of the 10 other antispyware apps we reviewed in December 2007, left behind traces for all but one spyware.
Security
For privacy and security, change these iOS 9 settings right now
Microsoft
How to back up your Office 365 email database to your local computer
Security
Homeland Security warns thousands of industrial energy systems can be remotely hacked
Security
These companies lost your data in 2015's biggest hacks, breaches
Security
US government is spending billions on old tech that barely works, says watchdog