Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Time and again we write about security breaches that would have been prevented by two-factor authentication. What are the ways people do this in the real world?
Impossible? Apparently not, as US researchers have discovered.
Security researchers at FireEye claim the majority of the most popular free Android apps are susceptible to Man-In-The-Middle (MITM) attacks.
Australia’s spending on information security is hit to hit almost AU$2 billion in 2014, according to the latest research by Gartner.
Sponsored by Red Hat & Intel
The transparent nature of open source software does not make it any more vulnerable than closed systems, experts argue.
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
A new report says the majority of attacks experienced by higher education institutions come from malware infections, and most universities are ill equipped to prevent and handle such attacks.
It's been just over one month since Violet Blue switched from being a lifetime Apple and Android user to trying out a Nokia 925. Our newest Windows Phone user has a few things to say.
Modifications to the core Android operating system would allow companies to plug in security enhancements for mobile devices, potentially improving the security of BYOD schemes within the enterprise.
A phishing campaign jumping on the Bitcoin bandwagon is targeting organizations within the media, high-tech, education, finance and manufacturing industries.
Symantec is aggressively pushing its managed security business, and will do so through its newest security operations centre in Sydney.
The attack affected customers in 24 states, but was limited because UPS Store franchised locations run on isolated networks.
Proposal focuses on balancing national security and end-user privacy.
Still reeling from the 2013 data breach, US retailer Target is weighed down with a financial burden that is hurting investors.
File-encrypting ransomware keeps rolling in with a new gang that appears to be beta-testing its product.