Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
A new long-term study by malware research group AV-Test shows that Adobe's Reader and Flash and all versions of Java are together responsible for a total of 66 percent of the vulnerabilities in Windows systems exploited by malware.
Researchers have uncovered a database where over two million stolen login credentials are being stored. Facebook, Twitter, Google and Yahoo accounts are in the mix.
Trustwave's SpiderLabs found a Pony Botnet Controller server holding over two million passwords and account credentials for ADP payroll, Facebook, Twitter, Yahoo and more belonging to victims around the world.
NSA whistleblower Edward Snowden spent a week in New Delhi, training in advanced ethical hacking, where he earned his certification as an EC-Council Certified Security Analyst.
An interim report into the release of the email metadata and content of communications by New Zealand MP Peter Dunne, Parliamentary staff and a journalist finds failings in a new IT system servicing both the Executive and Parliament.
Conventional information security falls down when it comes to spotting fishy activities inside the system. That's why it will eventually be replaced by real-time big-data technology, says machine-learning firm Darktrace.
An Iranian news agency says that a new worm more powerful than Stuxnet is being developed to disrupt the country's nuclear program.
Government says it plans to ask the U.S. how it can decrypt data sent over messaging services such as WhatsApp and Viber, and complain about the lack of cooperation from U.S. service providers in aiding its cybercrime investigations.
Attorney-General George Brandis has backed Prime Minister Tony Abbott's description of metadata as "essentially billing data" as a perfectly accurate shorthand description for a debatable term.
Hackers, hacktivists and cyber-warriors all hit the headlines in 2013, and will undoubtedly do so again in 2014. Here's an analysis of what the experts at seven security vendors think will happen in the coming year.
Businesses constantly fail to identify risks at the board level or implement the right security measures. But where does the breakdown occur, and how can other organisations avoid making the same mistakes?
More sophisticated, targeted attacks on Asia-based firms should drive the evolution of internal culture and processes to combat such threats. There are significant hurdles to overcome, however, and the cyberthreat landscape remains fundamentally global.
It isn't just the attackers' arsenals that are expanding: the role of the information security chief is widening too, according to one finance-sector CISO.
The revelations of US surveillance have changed everything and nothing about our perception of the internet.
Our increasingly connected world is forging a new and complex threat landscape. This guide looks at the escalating security challenges and what you can do to mitigate the risks.