An HP report highlights how the bulk of exploits in 2014 revolved around vulnerabilities that were discovered before 2013.
Showing results 1 to 20 of 452
The Sony hack, which US authorities claim was carried out by North Korea, crippled networks and destroyed data -- but not before the hackers stole terabytes of it.
Potential security vulnerabilities found in the NSW roads management network could lead to accidents and vehicle congestion, according to a new report by the NSW auditor-general.
Adobe patches nine vulnerabilities -- four of which are considered "critical" -- in order to protect against hackers who could exploit the bug to take control of an affected system.
You might not hire a pickpocket to be a guard, but the UK's cybersecurity shortage has prompted a skill hire, no matter the origin.
The Windows, Mac and Linux versions of Flash Player all have critical security vulnerabilities patched in a new version.
China is high on the list of suspects as President Obama meets with the Chinese premier to discuss, among other things, cybersecurity.
The Obama Administration has admitted that a cyberattacker was able to gain access to the US government's systems.
The FBI's director believes that Chinese hackers are not all that subtle, but are still prolific enough to break into networks and walk out with the goods — costing US businesses billions every year.
Hackers have reportedly broken into US government systems that store personal data on federal employees.
The UK government's secure network has come under attack from hackers controlled by a foreign state.
A Juniper VPN client that shipped with Windows 8.1 is vulnerable to Heartbleed. Microsoft has released a fix through Windows Update.
[UPDATE] A new version of Flash fixes two vulnerabilities in the Windows, Mac and Linux versions. They're not super-high priority.
The company is also increasing the bounties for patches of major open source projects.
Critical vulnerabilities in Flash on Windows, Mac and Linux expose users to attack.
A determined attacker can get into any network; this book is a practical guide to spotting them quickly when they arrive and ejecting them before serious damage is done.
Groundbreaking Balkan hacker conference BalCCon: First Contact brought hackers from all over the world to its successful launch and makes plans for next year's edgy event.
The networking giant has fixed a number of vulnerabilities that could allow hackers to remotely execute commands or disrupt critical processes.
What could bring Red Hat, Cisco, VMware, and Microsoft together in one cause? Would you believe The Linux Foundation and Software-Defined Networking? Believe it.
The Flash developer is rolling out an emergency update to the world's most popular Web plug-in for two vulnerabilities, that are currently being actively exploited by hackers.
The best of ZDNet, delivered
- 1 33 ways to improve your iPhone's battery life
- 2 Perfectly legal ways you can still get Windows 7 cheap (or even free)
- 3 How much does an iPhone 6 really cost? (Hint: It's way more than $199)
- 4 Seven privacy settings you should change immediately in iOS 8
- 5 So you have an app idea and want to make a bajillion bucks