Security
Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Featured Stories
Related Topics
Articles about Security
Pakistani police decrees mobile ban on New Year's Eve
Karachi residents will not have mobile services for a 12-hour window, as the police tries to prevent a planned terrorist attack on the city.
Zero-day loophole in older IE browsers found
Attackers can exploit the Internet Explorer vulnerability to gain same user rights as the current user and launch malicious Web sites, according to Microsoft.
China dominates 2012 cybersecurity talking points
From hacking and cyberespionage to its efforts to improve software piracy, the Asian giant was never far from making the news this year.
Putting security in perspective: beware of 'vending machines,' not sharks
High-profile security attacks are like shark attacks: they get a lot of press, but do not represent the greatest threats to enterprise security.
Hacker, Verizon duel over customer record claims
A hacker said he has acquired more than 3 million Verizon customer records -- but leaks only 10 percent of them, after the phone and broadband giant fails to fix a security flaw. Verizon disagrees.
Simple, low-tech solutions for school safety
Before politicians take the next 4 years to debate gun control legislation of dubious merit, there are things that schools, districts, and communities can begin doing right now to keep our kids safer at school.
Travel Tech Q&A: NetIQ's Ian Yip
NetIQ's product and business manager for the Asia-Pacific region shares how tech makes travelling fast and efficient, even having face-to-face chats with his hotel while he's still on the way there in the car.
Microsoft fixes faulty OpenType security patch
The company has re-released an important security patch, after the first iteration messed with OpenType rendering for some PowerPoint, Coreldraw and Quark Xpress users.
Specialization in non-security fields key to fighting cyberthreats
Evolving threat landscape means professionals with expertise in non-security areas will be valuable due to their knowledge and skills of technologies and business needed to keep up with cybercriminals.
India developing own OS to boost cybersecurity
Defense Research and Development Organization is creating country's own operating system to reduce its dependence on foreign operating systems, which it says may contain security risks.
The Apocalypsecast
On the final Technolatte podcast for 2012, the Australian team looks at the big tech stories of the year.
Vic govt opens new privacy and data-protection office
The Victorian state government in Australia has opened a new government office focused on privacy and data protection.
2012: ZDNet's definitive guide to the year in tech
A look back at the hot topics, major discoveries, and technological breakthroughs of 2012: from privacy to surveillance, major product launches, successes and catastrophes.
Samsung aims to fix severe Android device vulnerability
The world's top mobile phone maker says it is working on a fix for a security flaw that affects some of its flagship smartphones and tablets.
Chinese e-commerce sector main target of cybercriminals
China's real-name rule for online activities has made e-commerce sites more attractive targets, as cybercriminals see identity theft as opportunities for monetization and masking online fraud activities.