Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
A security flaw in Amazon's website can lead to malicious links being added to Kindle e-books, which one researcher says can be used to compromise a person's Amazon.com account.
The fines threatened against Yahoo for failing to "join" the NSA's PRISM program would have thrown the company into financial turmoil. The company's lawyers speak out.
If you don't know your passwords, they can't be phished. The domain of the site may be obscure to you, but the password manager knows.
Apple has said it will protect personal information collected through Health apps and the Apple Watch, but regulators in the US want to know how it will monitor and enforce privacy policies.
The long and sordid story of WikiLeaks takes an astonishingly irresponsible and very dangerous turn.
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
Attorney-General Brandis needs to forget categorising personal data by how it is collected, and focus on whether its use to solve crime justifies invading our privacy.
Demands for user data requests have more than doubled in five years, with the U.S. government leading pack in the global intelligence gathering race.
Even if we accepted the ridiculous premise that privacy is at odds with progress, no it's not too late, for a couple of reasons.
Edward Snowden and Glenn Greenwald have accused New Zealand's prime minister of deception over new internet laws. John Key responded by declassifying documents that he says prove he never implemented plans for mass surveillance.
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
12 years old and finally over: Is the Harkonnen Operation the longest-running malware campaign so far?
Cyber-criminals targeting European corporations and governments managed to stay undetected since 2002 - until one security company found them.
The research firm claims that 75 percent of all mobile applications will fail basic security tests next year -- leaving the enterprise vulnerable.
The fugitive NSA whistleblower Edward Snowden says any statement that mass surveillance isn't performed in New Zealand is 'categorically false', as New Zealand Prime Minister John Key has released Cabinet documents to disprove Snowden's claims.
Documents released by former NSA contractor Edward Snowden have revealed that a global internet mapping program dubbed Treasure Map has been spying on German telcos' networks, despite US government assurances that the program was not for surveillance purposes, according to a report by Der Spiegel.