Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
USIS, which performs background checks for the Department of Homeland Security, revealed that it was hacked earlier this month. The same company vetted Edward Snowden for the government.
Time and again we write about security breaches that would have been prevented by two-factor authentication. What are the ways people do this in the real world?
Impossible? Apparently not, as US researchers have discovered.
Security researchers at FireEye claim the majority of the most popular free Android apps are susceptible to Man-In-The-Middle (MITM) attacks.
Australia’s spending on information security is hit to hit almost AU$2 billion in 2014, according to the latest research by Gartner.
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
Sponsored by Red Hat & Intel
The transparent nature of open source software does not make it any more vulnerable than closed systems, experts argue.
A new report says the majority of attacks experienced by higher education institutions come from malware infections, and most universities are ill equipped to prevent and handle such attacks.
It's been just over one month since Violet Blue switched from being a lifetime Apple and Android user to trying out a Nokia 925. Our newest Windows Phone user has a few things to say.
Modifications to the core Android operating system would allow companies to plug in security enhancements for mobile devices, potentially improving the security of BYOD schemes within the enterprise.
A phishing campaign jumping on the Bitcoin bandwagon is targeting organizations within the media, high-tech, education, finance and manufacturing industries.
Symantec is aggressively pushing its managed security business, and will do so through its newest security operations centre in Sydney.
The attack affected customers in 24 states, but was limited because UPS Store franchised locations run on isolated networks.
Proposal focuses on balancing national security and end-user privacy.
Julian Assange (remember him from WikiLeaks?) wants out of the Ecuador embassy and no one cares. It looks like IBM's hardware sale to Lenovo is going through. Plus lots more worldwide government IT news.