Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
The surge of web-connected devices - TVs, refrigerators, thermostats, door locks and more - has opened up huge opportunities for cyber attacks because of weak security, researchers say.
The Australian Department of Communications has suggested that the controversial MyGov account system could be used as identification for an electronic voting trial for the 2016 federal election.
Microsoft is on the hunt for security startups in Israel, after launching a security-focused accelerator program in Tel Aviv in partnership with cloud services provider, Akamai.
Bluebox Labs recently discovered a new serious security Android vulnerability. Google has released a fix for it. If you're not careful, though, you could still be in danger.
BlackBerry's acquisition of German software firm Secusmart is aimed at securing voice and data and putting better mobile security in every president and chancellor's hand.
Learn how to create a security culture within your organization for an added layer of IT protection.
HP found 25 vulnerabilities per device including everything from TVs to thermostats to home alarms and scales.
In the second quarter of this year, Huawei says it has seen rapid increases of handset shipments beyond its traditional Chinese stronghold.
SEC to Facebook: yeah, we're good, Homeland Security does software, and go ahead and unlock your cellphone [Government IT Week]
It's been a slow summer in Gov news, but at least the Library of Congress seems willing to let you unlock your cell phone. The SEC just "liked" (or at least ignored) Facebook's IPO mess, and DHS is now the Department of Homemade Software. Read on...
My Amazon home page shows me how much the company knows about me and my online activities. Here we show you which privacy and security settings can help you reduce the information Amazon holds about you.
A report by Zurich has found that while technology such as the internet and the cloud can be beneficial for small to medium businesses, it's also putting them at risk.
Firefox has blocked known phishing and malware sites for some time. Now it will check reputation on individual files and soon use file signatures.
On Monday, several media outlets mistakenly reported that Apple had installed "backdoors" on millions of iPhones and iOS devices. UPDATED.
After being called to account over its handling of the 'right to be forgotten' ruling, it has been revealed that Google is approving around 50 percent of all requests.
Data collected by the likes of the NSA in a manner that would be forbidden in the Netherlands can still be used by the country's government, according to a recent court ruling.