Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Turns out there was a bit of a vulnerability (and lack of communication) between Yahoo and Facebook. Whoops!
This absorbing documentary follows film-maker Laura Poitras and journalist Glenn Greenwald as they make contact with the whistleblower and unleash a media storm.
If iOS and OS X developers want their notifications to reach end users, they should start supporting TLS now.
Xiaomi is moving its services and user data to the cloud ahead of a push into markets outside of China.
Days after the iPhone 6 launched in mainland China, Apple wants to assure the Chinese government that the new device is safe and has no backdoors.
BYOD means freedom of device choice for business users, but it can also unleash an avalanche of security concerns. This ebook will help you sort out the risks and take the right steps to contain...
In almost every security incident there's some best practice that someone didn't follow. Here are six security technologies and techniques that would help in these cases.
Windows 10 will build in standards-based two-factor authentication to every device, effectively neutering most phishing attacks and password database breaches. The company also announced new features aimed at securing corporate machines from malware attacks and data leaks.
A report released by Get Safe Online shows that while more than half the population has been affected only a third report it.
Apple has provided a lesson in browser security after hackers hijack connections to iCloud.com in China.
If the NSA's unconstitutional surveillance of Americans isn't creepy enough, how about an automated tool that links your camera to you through social media? Hidden info stored on every photo makes it possible.
Criminals hide in the darkest places of the internet, says the outgoing director of GCHQ, and we have to enter that labyrinth to find them.
The Department of Communications has argued that forcing ISPs to block certain websites under Section 313 of the Telecommunications Act is not a form of internet filtering.
Following the arrest of a staff member, the Australian Bureau of Statistics is implementing all of the recommendations that were made to the organisation to strengthen its sensitive information controls.
A vulnerability exists in Windows OLE for all versions except Server 2003. The company has released a workaround to block known attacks, but newer attacks could still get through.