Latest Topic for ZDNet in Security
Updated: 10 hours 43 min ago
In almost every security incident there's some best practice that someone didn't follow. Here are six security technologies and techniques that would help in these cases.
Windows 10 will build in standards-based two-factor authentication to every device, effectively neutering most phishing attacks and password database breaches. The company also announced new features aimed at securing corporate machines from malware attacks and data leaks.
A report released by Get Safe Online shows that while more than half the population has been affected only a third report it.
Apple has provided a lesson in browser security after hackers hijack connections to iCloud.com in China.
If the NSA's unconstitutional surveillance of Americans isn't creepy enough, how about an automated tool that links your camera to you through social media? Hidden info stored on every photo makes it possible.
Criminals hide in the darkest places of the internet, says the outgoing director of GCHQ, and we have to enter that labyrinth to find them.
The Department of Communications has argued that forcing ISPs to block certain websites under Section 313 of the Telecommunications Act is not a form of internet filtering.
Following the arrest of a staff member, the Australian Bureau of Statistics is implementing all of the recommendations that were made to the organisation to strengthen its sensitive information controls.
Two-factor authentication within Google Chrome has been extended to support USB keys instead of one-time codes.
A vulnerability exists in Windows OLE for all versions except Server 2003. The company has released a workaround to block known attacks, but newer attacks could still get through.
A man-in-the-middle (MITM) attack in China against logins to Apple's iCloud is easily-detected by web browsers, but appears sophisticated in other ways.
U2F is Universal 2nd Factor, the first FIDO Alliance standard for two-factor authentication. The goal: simple systems to combat phishing and other credential breaches.
Apple is ruffling features by collecting search and location data from OS X Yosemite users through Spotlight features that some argue should be off by default.
Tech CVs are more likely to be inaccurate than those in staffing or financial services.
Fingers have been pointed at the Chinese government over alleged cyberattacks targeted at Apple's iCloud with the aim of furtively lifting user data.
Staples has become the latest US retailer to have potentially suffered cyberattack.
Stopping staff using certain web services may be in decline outside regulatory environments, but even where it is being attempted it may be falling well short of its aims.
Samsung Electronics' Knox-enabled Galaxy devices have become the first mobile gadgets to be NIAP validated and approved for classified use by the US government, reports ZDNet Korea's Cho Mu-hyun.
The Australian communications watchdog has revealed that Australian government agencies are accessing more data than we previously thought.
It's only about a month since iOS 8.0 was released so there's not much new in security patches to add to 8.1. Two of the fixes also show up in a new Apple TV version.