Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Users are still clinging to hopes for the best without preparing for the worst, even with two-factor authentication and identity management advancements.
People working in IT broadly comprehend the threat the use of cloud services could pose to corporate data but that understanding is no substitute for detailed insights, according to Netskope CEO Sanjay Beri.
Before you sync your iCloud or reinstall your apps, you need to lock down your iPhone or iPad. Here are seven important tweaks (and more) you can set to bolster your privacy.
As part of a the Victorian Review of Counter-Terrorism Legislation, Victoria Police will receive extended powers to remotely access people's computers for terrorist-related investigations.
Apple has activated a two-factor authentication process for iCloud access, requiring users to enter a dynamically generated pass code in addition to login and password details.
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
Having been sold the image of Cupertino as the privacy good guy, and a music collection as a personalised reflection of one's tastes, Apple has overplayed its hand by pushing an album onto its users.
Cisco has launched Cisco ASA with Firepower Services, a threat-focused firewall aimed at providing businesses with controls to assess threats, correlate intelligence, and optimise defences to protect networks.
New versions fix eight security vulnerabilities, several of which could result in system compromise.
Both security incidents occurred overnight involving a local mobile operator and entertainment company, putting customer data at risk and questioning the ability of enterprises in the country to adequately protect their clients.
Installation problems block one of the updates for Lync Server 2010 in MS14-055.
A security flaw in Amazon's website can lead to malicious links being added to Kindle e-books, which one researcher says can be used to compromise a person's Amazon.com account.
The fines threatened against Yahoo for failing to "join" the NSA's PRISM program would have thrown the company into financial turmoil. The company's lawyers speak out.
If you don't know your passwords, they can't be phished. The domain of the site may be obscure to you, but the password manager knows.
The long and sordid story of WikiLeaks takes an astonishingly irresponsible and very dangerous turn.