Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Trusteer's solutions have been deployed in tens of millions of systems, all of whom are now IBM customers.
The Australian Department of Immigration and Border Protection says the Privacy Act forces it to ask holders of confidential electronic documents to return them to the department.
[CORRECTION] All versions of Windows and Internet Explorer will receive updates on Patch Tuesday next week. The recent IE zero-day will be included in the fixes.
Visa CFO Byron Pollitt explains why the Target data breach could spur a little investment boom as retailers scramble to upgrade infrastructure to cut fraud.
It's time for spring cleaning, at least at DocuSign.
The most severe bug affects Cisco's Aironet 1260, 2600, 3500 and 3600 access points, and could allow unauthorized parties gain privileged access to the affected device.
Yes, GnuTLS has major security holes. So what? Almost no one uses it in ways where it could be vulnerable to fraud.
Following Mt. Gox and Flexcoin, Poloniex has admitted to losing over 10 percent of customer funds due to cyberattacks.
Early this week Snapchat imitator Puffchat threatened a hacker for disclosing serious security holes and fallacies in the app's privacy claims. As expected, things aren't going well for Puffchat's arrogant founder.
Service provider says it's reverting to Yahoo-only access controls, won't accept Facebook, Google credentials any longer
The number of malvertisements targeting mobile devices more than tripled last year, pushing contaminated web ads past pornography as the single largest malware threat to mobile users.
The news about Beth Jacob's departure comes as Target is trying to restore trust in the company's security processes and procedures.
The next version of Security Essentials will include prominent warnings that Windows XP is not a safe operating system.
One inane tweet from mid-2012 was enough to start a chain reaction of information-gathering that could have rivaled the work of a government intelligence agency. And with that dossier of data, a hacker could have ended up ruining one man's life.
If you're a government worker and have been wanting to run Red Hat Enterprise Linux securely on your Amazon cloud, it's your lucky day. The popular open-source operating system is finally available on Amazon Web Services.