Data protection laws have been broadly successful says, European Commission - but problems around fragmentation and other issues remain.
As the COVID-19 outbreak threatens to overload the healthcare system and the global economy, it's also having a powerful impact on the security of businesses and individuals.
Yes, you read that headline correctly, Microsoft has just released a security program for Linux.
Glupteba creates a backdoor into infected Windows systems - and researchers think it'll be offered to cyber criminals as an easy means of distributing other malware.
The hacker group is believed to operate out of Eastern Europe, based on current evidence.
Forced reboots are affecting some machines running Windows 10 version 1809 and above.
The ongoing case claims the owner of BTC-e permitted the platform to be used for money laundering.
The malware surfaced just days after health officials in Canada announced the launch of a tracing app in the fight against COVID-19.
Privacy Bee thinks it finally has the answer in the fight against identity theft and data privacy trade that does not involve waiting for the next great breach and playing clean up in the aftermath.
It's part of the NSW government's AU$240 million commitment to improve the state's cybersecurity capabilities.
Tech companies and terrorists have been called out by trio of GOP senators.
Safari also gets support for WebExtensions, the same browser extensions API used by Chrome, Edge, and Firefox.
Twitter said DDoSecrets account leaked and promoted BlueLeaks, a huge collection of files stolen from more than 200 US police departments and fusion training centers.
UPDATE: Microsoft Defender ATP for Linux has also exited public preview and is now generally available for all users.
Already one of the most dangerous forms of ransomware, now Sodinokibi looks like it could also be attempting to make money from stolen payment information too.
Quite a few readers have expressed an interest in seeing what's inside a super-secure DataLocker DL3 encrypted hard drive. Well, let's get the screwdrivers out and take a look!
I'm usually wary of security apps, but iVerify by Trail of Bits is different. It comes highly recommended and offers a lot of features in a small download.
External hard drive featuing AES 256-bit XTS mode encryption and a built-in LCD keypad.
Millions of us have adopted smart 亚游手机客户端home and IoT devices, but these products continually prove themselves to be vulnerable endpoints. Here are some of the most noteworthy IoT cyberattack examples of this year.
Time to dump those cheap dollar-store flash drives, or the ones you picked up at a trade show and get a encrypted micro USB SSD that would impress James Bond.
Despite a worldwide pandemic, cyberattackers haven't stopped poking holes in our defenses. These are the worst incidents so far in 2020.
Minut is a noise, temperature, and motion sensor that has been built for privacy that's aimed primarily at the short-term rental market -- think Airbnb, that sort of thing.
These laptops conform to Microsoft’s Windows 10 Secured-core PC requirements and have been tested to meet or exceed MIL-STD-810G standards.
The world's first and currently only FIDO2 Level 2 security key with built-in fingerprint reader.
A list of all the major vulnerabilities that impact Intel processors.
Malware which resists removal to covert spying on locked smartphones -- mobile threats are becoming more complex and dangerous with each year that passes.
Attackers targeted everything from gas pumps to your smart TV this year.
Every night is fright night with what can happen once these scary technologies take hold in ways that you may not have imagined.
All the facts and figures that matter to you and your business from the past month in technology news.
The world’s first Lightning-compatible security key
Security firm identifies 111 malicious Chrome extensions collecting user keystrokes, clipboard content, cookies, more.
Lockdown closed shops and people turned to the internet to buy things - and many found that if an offer is too good to be true, it probably is.
Microsoft brings malware scanning to firmware on Windows 10 PCs.
Void can detect the 'liveness' of a voice.
Facebook files lawsuits against MGP25 Cyberint Services in Spain and against Massroot8 in the US.
Russia's media watchdog Roskomnadzor said Telegram has agreed to help Russian law enforcement fight against extremist and terrorist content shared on its platform.
Previously unknown attacks used against fake systems show big problems remain with industrial systems security.
Danny Palmer tells Karen Roby about a fake network that was set up with the aim of examining the actions of cyber criminals -- and it only took a few days before they attacked it with malware. Read more: https://zd.net/3hNcMz0
It was a 2.3 Tbps DDoS attack. The previous record was an attack of 1.7 Tbps, recorded in March 2018.
Intel says CET can protect against ROP/JOP/COP malware.
A month after the app went live in Australia, tests conducted by the DTA saw Bluetooth interactions between locked iPhones perform at under 50%.
It will tell you if your iPhone has been hacked.
Password resets, video call fails and VPN problems are adding to the burden on tech workers.
51% of organisations surveyed by Mimecast have suffered a ransomware attack, meanwhile NTT says ageing devices are causing network vulnerabilities, and two local companies have been struck by 'cyber incidents'.