Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
If iOS and OS X developers want their notifications to reach end users, they should start supporting TLS now.
Xiaomi is moving its services and user data to the cloud ahead of a push into markets outside of China.
Days after the iPhone 6 launched in mainland China, Apple wants to assure the Chinese government that the new device is safe and has no backdoors.
In almost every security incident there's some best practice that someone didn't follow. Here are six security technologies and techniques that would help in these cases.
Windows 10 will build in standards-based two-factor authentication to every device, effectively neutering most phishing attacks and password database breaches. The company also announced new features aimed at securing corporate machines from malware attacks and data leaks.
BYOD means freedom of device choice for business users, but it can also unleash an avalanche of security concerns. This ebook will help you sort out the risks and take the right steps to contain...
A report released by Get Safe Online shows that while more than half the population has been affected only a third report it.
Apple has provided a lesson in browser security after hackers hijack connections to iCloud.com in China.
If the NSA's unconstitutional surveillance of Americans isn't creepy enough, how about an automated tool that links your camera to you through social media? Hidden info stored on every photo makes it possible.
Criminals hide in the darkest places of the internet, says the outgoing director of GCHQ, and we have to enter that labyrinth to find them.
The Department of Communications has argued that forcing ISPs to block certain websites under Section 313 of the Telecommunications Act is not a form of internet filtering.
Following the arrest of a staff member, the Australian Bureau of Statistics is implementing all of the recommendations that were made to the organisation to strengthen its sensitive information controls.
Two-factor authentication within Google Chrome has been extended to support USB keys instead of one-time codes.
A vulnerability exists in Windows OLE for all versions except Server 2003. The company has released a workaround to block known attacks, but newer attacks could still get through.
U2F is Universal 2nd Factor, the first FIDO Alliance standard for two-factor authentication. The goal: simple systems to combat phishing and other credential breaches.