Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Enterprise interest and investments ready to jump over the next two years, Gartner says
An attack which took place against Google exposed sensitive data concerning U.S. surveillance targets.
Although ISPs and network operators have had access to the rough figures of malware infections for some time, the Australian Communications and Media Authority has now begun publishing the statistics for the public.
Websense, which specializes in security software, will be acquired by Vista Equity Partners for $24.75 a share in cash. The deal comes at a 53 percent premium.
An Indian malware service is building attack software for projects involving secret surveillance.
A service which boots websites offline for payment is legitimate, says the owner. But why a backdoor monitored by the FBI?
Telstra is again in the Australian Privacy Commissioner's sights, with Timothy Pilgrim stating that his office will open a new investigation into the matter due to the telco's latest privacy bungle.
An unauthorized attempt to access the administrative system was detected, but leaked information does not include passwords and identity verification data.
If system logs weren't originally created for security, why isn't business data also being used? And can we automate defensive decisions where we can create self-defending networks?
Payment vendor PayPal has said that Australians have become more comfortable online, and are often unaware of the size and impact of their digital footprint.
VPN support may not be coming to Windows Phone 8 this year, as was rumored and hoped for by many business users. But Good Technology's secure messaging app is now on WP8.
The announcement comes shortly after a scandal at the financial data services company in which reporters were given access to terminal customers' data.
The Pentagon has cleared iPhones and iPads running iOS 6 for use in the U.S. military, just over a week after the U.S. government cleared the software for federal use.
Barely concealed security threat found on activist's Mac.
Over the last few months, several IT companies and telcos have launched desktop virtualization, mobility management and enterprise security tools designed for BYOD.