Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
If takeover plans by SoftBank and Sprint are finalized, then SoftBank will give the U.S. government influence due to security concerns.
Australia's isolation from geo-political conflicts means it has few, if any, enemies that might try to harm it via online attacks, but it could get caught up in the collateral damage between other nation's battles.
AusCERT has returned to the Gold Coast for another year, and ZDNet was there to bring you all the highlights.
What do security specialist HD Moore and the Queensland Police have in common? They both feature in this lighthearted round-up of day 1 at AusCERT 2013.
Indian CIOs say they are struggling to securely manage personal devices employees use to access corporate networks and applications, reveals a new survey.
Former McAfee Threat Research vice-president Dmitri Alperovitch has called for greater powers for private companies, saying that they should be allowed to make citizens' arrests and limited retaliatory action against hackers.
Highlighting the fact that there are security vulnerabilities in your organisation sounds like common sense, but there is such a thing as doing it too fast, according to Foxtel CISO Kevin Shaw.
After a long string of high profile attacks on accounts held by government and news agencies, Twitter is finally stepping up its game.
This is the first of a three-part series where our own David Gewirtz tests and installs a full-perimeter, Internet-centric, mobile-enabled video surveillance system. In this installment, he details the approach that didn't work.
In Solera, Blue Coat finds a big boost for its bid to secure the enterprise.
Would retaliatory attacks make hackers think twice?
Many small businesses struggle to cope with internet security and are refusing to trade online as a result.
A new report claims that a number of U.S.-based utilities are fending off cyberattacks on a daily basis.
Google wants you to start talking to your desktop with Chrome 27.
Firewalls and antivirus software bite deepest into most organisations' security budgets to the detriment of the other stages in the breach process.