Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Well that's certainly a phrase one US judge can nail on the casket of her career.
US Homeland Security has warned businesses to stay on their guard against a newly-detected strain of point-of-sale malware.
Some 78 percent of Singaporeans shop online at least once a month, but more than half at 57 percent are concerned about their financial details falling into the wrong hands, reveals survey on e-commerce security.
The social network has stepped up password security in the past, especially after finding itself the victim of widely reported cyber attacks.
Everyone knows that USB thumb-drives can spell security trouble, but a German security group has found new and nasty ways to use USB devices to wreak havoc on computers.
Learn how to create a security culture within your organization for an added layer of IT protection.
US law can apply anywhere in the world, so long as a technology company has control over foreign data, a court rules.
Russian officials have asked the companies to hand over their source code so it can be tested for surveillance capabilities.
IBM is adding more troops for its assault on the enterprise security market - this time with an Italian vendor giving it tools to handle segregation of duties.
Cisco has suggested that businesses look at security in layers, in much the way as they do when looking at adopting new infrastructure.
While the company said users of Tor should "assume they were affected," the developers of the anonymous browsing service do not yet know what "affected" means.
With one week until the eve of America's biggest and most controversial hacker conference, we've got a hotlist of explosive talks set to go off at DEF CON 22.
The surge of web-connected devices - TVs, refrigerators, thermostats, door locks and more - has opened up huge opportunities for cyber attacks because of weak security, researchers say.
The Australian Department of Communications has suggested that the controversial MyGov account system could be used as identification for an electronic voting trial for the 2016 federal election.
Bluebox Labs recently discovered a new serious security Android vulnerability. Google has released a fix for it. If you're not careful, though, you could still be in danger.