Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
The world's largest military alliance is getting serious about digital attacks, but the reality is much more complicated than the policy suggests.
The communications company said the security-heavy storage offering helps ease the cloud migration process for federal agencies.
UPDATED. Google is consciously using their influence to push certificate authorities to advance security standards soon. Would you believe the problem is Windows XP SP2?
The hunt for hackers and leakers behind the massive celebrity leak on Sunday begins.
A new HP report suggests the reclusive country's cyber warfare capabilities are rapidly making North Korea a credible threat to Western systems.
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
The Mac malware situation is a much lower-pressure one than that on Windows, so many products perform very well. But it's still worth comparing them, so AV-TEST.org tests 18 products, both free and paid.
A hacker may have been responsible for leaking explicit photos of celebrities due to a weak link in their Apple iCloud accounts. Here's what you can do to keep your embarrassing selfies (and company secrets) out of the public eye.
Apple has patched an exploit with its Find My iPhone online service that may have been used by hackers to gain access to personal photos stored on iCloud accounts belonging to some 100 celebrities.
Under a new plan known as 'data embassies', duplicates of essential databases and services stored or run from secure datacentres on foreign soil.
As the Australian government looks to force telcos to retain customer data for law-enforcement investigations, the number of requests for customer data that Telstra is receiving from Australian law-enforcement agencies has risen in the last six months.
White House revamps tech management, Hillary's not a cloud expert, and more bank hacks [Government IT Week]
It's time once again to go around the world and see what's happening in government IT. Here's a Labor Day shoutout to all our American readers.
A Cabinet minister has resigned after an email revealed her contact with a controversial blogger.
13 million person pilot of national identity card combines both biometric verification for state services and a prepayment wallet aimed at bringing financial services to the poorest.
Data retention will be a useful tool in a proposal from the content industry to get ISPs to match IP addresses connected to alleged infringers with customer accounts.