The Windows 10 security guide: How to safeguard your business
Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Utah Valley University and Utah State University will work with companies like Adobe and FireEye to create a pipeline of tech workers.
Responsibility for new attacks has been laid at the feet of the Kimsuky threat group.
On Sunday, Diamond Comic Distributors said a ransomware attack was affecting its order processing systems and its internal communications platforms.
The issue affects multiple versions of PAN-OS 8.1 prior to 8.1.17 and Randori said it found numerous vulnerable instances exposed on internet-facing assets, in excess of 70,000 assets.
Billions of dollars in grants and funding will be provided to FEMA, CISA and the EPA to protect the country's critical systems and local governments.
Remote working has resulted in a rise in the use of corporate VPNs. But inexperience means many businesses aren't equipped to look for and patch security vulnerabilities being exploited by malicious hackers.
A survey of 400 IT pros found that most are concerned about the potential for data breaches and attacks leveraging medical equipment.
"If you want to sideload, you can buy an Android phone."
Even if an Exchange account has multi-factor authentication enabled, an attacker could use this vulnerability to compromise email accounts.
A new surveillance campaign has revealed widespread infection on Android devices.
Cybersecurity researchers at Trend Micro lift the lid on Void Balaur, a financially motivated cyber-crime group that has targeted politicians, journalists, human rights activists, medical professionals and others since 2015.
A Mimecast survey of 742 cybersecurity professionals found that 80% have been targeted by ransomware over the last two years.
There are efforts afoot to rewrite many fundamental internet programs in Rust to make them safer to use.
This month includes fixes for zero-day flaws, some of which have been made public prior to patch release.
In Europe, Zero Trust went from concept to reality for many firms during 2020. APAC has been a very different story.
And there's a lot to like about the Yubikey Security Key C NFC, all for $29.
YubiKey Bio builds biometric authentication into a security key
Everyhting you need to know about iOS and iPadOS securoty, all in one place.
This is the ultimate security key for professionals.
Durable, fully reversible connectors, encapsulated in epoxy resin, and with updatable firmware.
I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download.
FIPS 140-2 Level 3 compliant storage drive with wireless unlock feature and remote management. IP57 rated for dust and water resistance.
The Netgear BR200 Insight Managed Business Router has been designed to be easy to set up, and features a built-in firewall, VLAN management, and remote cloud monitoring, and can be managed from anywhere you have an internet connection.
The YubiKey 5C NFC can be used across a broad range of platforms -- iOS, Android, Windows, macOS and Linux -- and on any mobile device, laptop, or desktop computer that supports USB-C ports or NFC.
The new Aegis Secure Key 3NXC builds on Apricorn's Secure Key 3z and Aegis Secure Key 3NX, taking the same proven form-factor and physical keypad, and adding something that users have been asking for -- USB-C support.
Transparency in security.
Certo AntiSpy is not an app. Instead, it is a utility that you download and install on a Windows or Mac, and you use that to scan a backup of your iOS or iPadOS for subtle signs of intrusion.
Would you like to spend less time unlocking your Android smartphone? Android has you covered.
Quite a few readers have expressed an interest in seeing what's inside a super-secure DataLocker DL3 encrypted hard drive. Well, let's get the screwdrivers out and take a look!
External hard drive featuing AES 256-bit XTS mode encryption and a built-in LCD keypad.
ZDNet Security Update: Danny Palmer talks to Mandiant's Kimberly Goody about the rise of a notorious ransomware group and how to protect against attacks.
Danny Palmer tells Beth Mauder about the findings of a new report which says we're in a 'golden era' for ransomware. Read more: https://zd.net/3EFFigt
ZDNet Security Update: Danny Palmer talks to Admiral Michael S. Rogers, Operating Partner at Team8 and former Director of the NSA and US Cyber Command, about cyber threats and the action needed to fight them.
ZDNet Security Update: Danny Palmer talks to Ed Williams, Director of SpiderLabs EMEA at Trustwave, about how cyber criminals get into networks and what they actually do once inside.
ZDNet Security Update: Danny Palmer talks to Zuzana Hromcová, malware researcher at ESET about the anatomy of powerful cyber attacks against web server software and how to protect against these threats.
Tonya Hall asks Matt Bradley, vice president at OnSolve, how artificial intelligence can help companies manage data breaches and other critical events.
Eva Blum-Dumontet, senior researcher at Privacy International, explains to Tonya Hall what's behind those seemingly innocuous fitness and diet questionnaires you find on social networks.
Tonya Hall asks Richard Hummel, manager at Netscout, about the latest cyberattack trends and why the number has skyrocketed.
Tonya Hall talks to Dr. Sridhar Ramaswamy, CEO and Co-founder at Neeva, about how a subscription-based search engine protects users' privacy and deliver better results.
Daphné Leprince-Ringuet says quantum computers are a major threat to security protocols, but Verizon claims this 'quantum-safe' VPN is future-proof. Read more: https://zd.net/3hyWPOi
ZDNet Security Update: Danny Palmer talks to the Alan Turing Institute's Prof. Carsten Maple about the increased use of digital identity systems such as vaccine passports -- and what's required to make them trustworthy and secure.
Danny Palmer tells Beth Mauder about three things you should be doing to keep your online accounts secure from cyber criminals. Read more: https://zd.net/3njaVr4
Tonya Hall talks to Joseph Menn, author and investigative tech reporter at Reuters, about the influential Cult of the Dead Cow hacking group.
ZDNet Security Update: Danny Palmer talks to John Donovan, CISO at Malwarebytes about the impact stress has on information security teams and how to help improve well-being of employees.
Danny Palmer tells Beth Mauder about LockBit ransomware and how aggressive new techniques mean it's becoming a potent cyber threat. Read more: https://zd.net/3Btcs1n
This phishing attack is using a sneaky trick to steal your passwords, warns Microsoft
Security
T-Mobile hack: Everything you need to know
Security
Security
Ransomware attackers targeted this company. Then defenders discovered something curious
Security
Fortinet, Shopify and more report issues after root CA certificate from Lets Encrypt expires
Security