Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Symantec wasn't the only company following Regin. Kaspersky and F-Secure have something to say about who was hit. Regin also spies on GSM cellular networks.
Online cybercrime 'schools' and a vast array of products and services focused on those wishing to enter the life of digital crime are more easily available in Brazil than any other country, says study.
With version 5.0, Android makes the work of enterprise admins much easier. Security is stronger and more standardized. Android fragmentation is crumbling.
Google's Mac team has kicked off the holiday season with Santa, its tool that looks for all things naughty and nice on its massive fleet of Macs.
Drones? What could possibly go wrong? Plus can China cripple our power networks? [Government IT Week]
ZDNet's David Gewirtz has been warning about China and the risk to US infrastructure for years. The NSA now seems to agree. Plus the FAA wants to restrict commercial drones, which we all knew was inevitable.
The Internet of Things will complicate security, redefine privacy, and require new laws. Both business and government must rise to the challenge -- and they need to get started right now.
Europe's security agency has warned that cryptographic protocols in vogue at the moment may not be as secure as thought.
Europe's law enforcement agency has cracked down on the use of remote access trojans.
Symantec researchers are impressed by Regin, which has been conducting high-level surveillance campaigns worldwide since 2008. Is it state-sponsored?
Here's my take on Computer Aided INvestigative Environment - a Linux-based, UEFI-compatible LIVE USB/DVD digital forensic system.
A collection of notable security news items for the week ending November 21, 2014. Covers enterprise, controversies, reports and more.
Want to avoid having your online accounts hacked? Enable two-factor authentication (2FA), a crucial security measure that requires an extra code when signing in from an unfamiliar device. In this post, I explain how to use a mobile app to make your accounts safer.
Google's play to establish Android in the enterprise has taken a step forward with the launch of its BYOD container for productivity apps.
What scams and schemes do you need to watch out for during the holiday season?
The brand image of the world's must-have anonymity tool is starting to look a bit tattered. The fans don't like it, but their response isn't helping their cause.