Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
After a long string of high profile attacks on accounts held by government and news agencies, Twitter is finally stepping up its game.
This is the first of a three-part series where our own David Gewirtz tests and installs a full-perimeter, Internet-centric, mobile-enabled video surveillance system. In this installment, he details the approach that didn't work.
In Solera, Blue Coat finds a big boost for its bid to secure the enterprise.
Would retaliatory attacks make hackers think twice?
Many small businesses struggle to cope with internet security and are refusing to trade online as a result.
A new report claims that a number of U.S.-based utilities are fending off cyberattacks on a daily basis.
Google wants you to start talking to your desktop with Chrome 27.
Firewalls and antivirus software bite deepest into most organisations' security budgets to the detriment of the other stages in the breach process.
Users could be saved from a lot of pain if information security professionals acted like dictators and forced them to patch, update and take precautions, but Google's chief technology advocate has called for a less totalitarian scheme.
Enterprise interest and investments ready to jump over the next two years, Gartner says
An attack which took place against Google exposed sensitive data concerning U.S. surveillance targets.
Although ISPs and network operators have had access to the rough figures of malware infections for some time, the Australian Communications and Media Authority has now begun publishing the statistics for the public.
Websense, which specializes in security software, will be acquired by Vista Equity Partners for $24.75 a share in cash. The deal comes at a 53 percent premium.
An Indian malware service is building attack software for projects involving secret surveillance.