This security hole, which impacts many older versions of Linux and some current ones, should be patched as soon as possible.
Showing results 1 to 20 of 822
Malaysia Airlines' website has been attacked by the Lizard Squad, with the hackers claiming to have compromised user data in the security breach.
The creator of the Linux kernel and Git has said that security issues should be publicly disclosed, not swept under the rug where vendors can leave them unsolved for years.
If you're tired of SharePoint's clunky administration, its difficult-to-manage security, and even more difficult to design interface, then you need to check out M-Files for your business CMS.
Nearly a quarter of Australian organisations have suffered an interruption to their business due to an IT security attack or breach over the past 12 months, according to new research by Telstra.
After cyberattack resulted in internal networks being shuttered and confidential files leaked across the web, Sony has pulled in the professionals.
Sponsored by Redhat and Intel
To maintain an application infrastructure that meets continually expanding business demands, organizations need more than a maintenance and support contract. Organizations need a proven, scalable, reliable, and secure enterprise platform.
BitSight found that although the retail industry is still very much a hack target, 75 percent of retailers hit with a breach managed to improve their security effectiveness.
The Windows, Mac and Linux versions of Flash Player all have critical security vulnerabilities patched in a new version.
A collection of notable security news items for the week ending November 7, 2014. Covers enterprise, controversies, reports and more.
Cost benefits make it tough for enterprises not to adopt cloud services in spite of the security risks, so they should embrace it by putting in place the necessary processes, say panelists at a discussion moderated by ZDNet blogger Eileen Yu.
The Unix/Linux Bash security hole can be deadly to your servers. Here's what you need to worry about, how to see if you can be attacked, and what to do if your shields are down.
The popular Linux and Unix shell has a serious security problem that means real trouble for many web servers. Fortunately, a patch -- as source code -- is available.
Sponsored by Redhat
Modern datacenters and next-generation IT requirements depend on capable platforms, with open source solutions offering a strong foundation for open hybrid cloud and enterprise workloads. A powerful, unified platform enables enterprises to use a solid foundation to balance demand while utilizing new trends and technologies such as virtual machines and the open hybrid cloud.
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
A draft document released by the Australian Department of Finance outlines requirements for government IT contractors to notify customers within 12 hours once they become aware of actual or suspected security incidents.
The tech giant's stock price has plummeted over the past 24 hours, sending Apple shares to a low not experienced since January.
USIS, which performs background checks for the Department of Homeland Security, revealed that it was hacked earlier this month. The same company vetted Edward Snowden for the government.
The Linux Foundation is strengthening the walls around the Linux kernel's source code Git repositories.
Sponsored by Red Hat and Intel
OpenStack has come a long way since it was initially launched four years ago. Discover the benefits OpenStack provides to business through it's modular architecture and design.
The best of ZDNet, delivered
- 1 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 2 Windows 10: You've got questions, I've got answers
- 3 Hands-on with Windows 10: Installing the latest Technical Preview
- 4 31 ways to improve your iPhone's battery life
- 5 How much does an iPhone 6 really cost? (Hint: It's way more than $199)