Which phone is vulnerable to malware?
Whether you use Android, iOS, Blackberry or another system, you are vulnerable. On some systems, more than 40,000 pieces of malware exist to infect your device.
Whether you use Android, iOS, Blackberry or another system, you are vulnerable. On some systems, more than 40,000 pieces of malware exist to infect your device.
Cyber-criminals are planning their "hits" more carefully and the attacks are lasting longer than ever.
Scammers are using scantily clad women as bait to entice Kiwi men into "compromising positions" during online video chat sessions - then blackmailing them.
Fears sparked by the likes of WikiLeaks and Edward Snowden mean information security staff are now among the most sought after professionals in New Zealand.
The email accounts of tens of thousands of Telecom Xtra customers have been hacked again, and this time there could be no end in sight to the deluge from fraudsters.
Small businesses are the next big target for cybercriminals and many aren't ready to defend themselves, says Bill Farmer.
Peter Dunne said he was told by the head of an inquiry into the GCSB report leak that he intended to access his phone records along with a press gallery journalist.
New documents show the David Henry inquiry asked Parliamentary Service for access to the phone records of Fairfax journalist Andrea Vance - but they were declined.
It's "rushed, ill-conceived and downright dangerous" says a QC, and changes to the GCSB bill secured by Peter Dunne don't address its flaws.
Editorial: All parties in Parliament can help ensure the needs of national security are balanced with adequate safeguards for privacy and civil rights. It is a rare opportunity to see how constructive each, including the government, can be.
Rules for accessing emails, security pass details and other information inside Parliament will be reviewed after concerns an MP and a journalist were tracked without permission.
Facebook has asked the Government for an exemption from a new spying law that could see its two million Kiwi users' messages subject to GCSB interception.
Those of us who had visions of a bristling, moody collision, something like that De Niro-Pacino scene in Heat, were always going to be disappointed, writes Toby Manhire.
John Key last night described Kim Dotcom as a 'conspiracy theorist' after he claimed the PM knew about him before the January 2012 raid.
Privacy commissioners say the public should be wary about this but most people are not, writes John Roughan. They post much more personal information about themselves on internet sites.
A mum will lobby NZ companies to pull their ads from a Latvia-based social networking site after her 12-year-old daughter was asked to provide explicit photos.
Prisoners in privately run Mt Eden Corrections Facility were able to access the internet through faulty computer kiosks a security review of public sector computer systems has found.
A review of Government information systems' security found weak points in 12 agencies which have now been addressed.
Pat Pilcher talks to the chief technology officer of MEGA, Mathias Ortmann.