Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Australian government agencies will be required to implement stringent new security policies, to monitor public servants in order to protect the government against the 'insidious enemy' of the 'trusted insiders' leaking sensitive information to the public.
Three non-security updates that were withdrawn shortly after release in August have been re-released. Unexplained changes made to over 100 x64 Windows 7 updates.
Reports are out that a new batch of stolen credit and debit cards hit the cybercrime underground on Tuesday, with multiple banks confirming that The Home Depot stores may be the source.
The world's largest military alliance is getting serious about digital attacks, but the reality is much more complicated than the policy suggests.
The communications company said the security-heavy storage offering helps ease the cloud migration process for federal agencies.
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
UPDATED. Google is consciously using their influence to push certificate authorities to advance security standards soon. Would you believe the problem is Windows XP SP2?
The hunt for hackers and leakers behind the massive celebrity leak on Sunday begins.
A new HP report suggests the reclusive country's cyber warfare capabilities are rapidly making North Korea a credible threat to Western systems.
The Mac malware situation is a much lower-pressure one than that on Windows, so many products perform very well. But it's still worth comparing them, so AV-TEST.org tests 18 products, both free and paid.
A hacker may have been responsible for leaking explicit photos of celebrities due to a weak link in their Apple iCloud accounts. Here's what you can do to keep your embarrassing selfies (and company secrets) out of the public eye.
Apple has patched an exploit with its Find My iPhone online service that may have been used by hackers to gain access to personal photos stored on iCloud accounts belonging to some 100 celebrities.
Under a new plan known as 'data embassies', duplicates of essential databases and services stored or run from secure datacentres on foreign soil.
As the Australian government looks to force telcos to retain customer data for law-enforcement investigations, the number of requests for customer data that Telstra is receiving from Australian law-enforcement agencies has risen in the last six months.
A Cabinet minister has resigned after an email revealed her contact with a controversial blogger.