Just How Secure Is Apple's TouchID?

The Touch ID fingerprint scanner is one of the most notable features of the iPhone 5s, but it’s not a perfect security solution. Just how does it compare to a standard password?

Ask LH: Do We Still Need Desktop Antivirus?

Hi Lifehacker, With companies using strong enterprise firewall products that detect viruses on the network, is there really a need for a desktop antivirus solution on corporate PCs?

Gmail Is Now A Little More Secure

Gmail is now a little more secure: HTTPS encryption will be used regardless of which device or network you’re using to send messages.

Why You Must Revamp Your Security Strategy (And How To Do It)

If you have any interest in information security, you’ll know that the last year or so has been nothing short of incredible. Following Edward Snowden’s leaks to the press, we now know that there has been systematic, broad and deep surveillance of online activity at a scale that could not have been previously imagined. Beyond simply snooping, the revelations pointed to infiltration of the hardware and software we rely on to secure our communications.

Gallery: Inside Symantec's Melbourne Security Data Centre

Symantec’s Melbourne Security Data Centre generates root keys for certificate authorities, a task that can’t be undertaken lightly given their vital role in online security. Here’s a photo tour of the rarely-seen and highly-secured centre, including the “Ceremony Room” used to generate the new keys.

Can A Mobile Phone Hack A Plane?

There’s a speculative report from the Sunday Express that theorises that Malaysian Airlines Flight MH370 might have been hijacked, potentially, by terrorists who might have used a mobile phone to access airline systems that could have been interconnected with the inflight entertainment system. That’s a lot of weasel words isn’t it?

Why We're Using More Managed Security Services

Managed security services provide an opportunity to improve your IT security without having to invest heavily in on-premises equipment. However, it seems the main reason we’re adopting them is a more pragmatic one: there simply aren’t enough security experts to go around.

What Every IT Pro Can Learn From Telstra's Customer Data Leak

An investigation by the Australian Privacy Commissioner explores how Telstra ended up placing details of 15,775 customers into a spreadsheet that was indexed by Google and available freely on its web site. That unfortunate experience provides plenty lessons for anyone involved with storing customer data — an especially important consideration with Australia’s privacy principles being strengthened this week.

Why New Privacy Laws Won't Stop Your Phone Being Tracked

Mobile phone tracking techniques are becoming more commonplace. Waste bins target ads. Shopping centres follow customers. Spooks follow airport passengers. Will the Privacy Act’s new definition of personal information provide enhanced protections against mobile phone tracking? Not really. Here’s why.

Ask LH: What Can I Do About Work Monitoring My Internet Usage?

Hey Lifehacker, While I know it’s my employer’s right to put any software they wish on workplace computers, I’d like to know if my PC is being monitored. If I do online banking during my lunch break, I’m worried that my employer might have access to my credentials. Is there any method you could recommend to check if I’m being watched?