Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Modifications to the core Android operating system would allow companies to plug in security enhancements for mobile devices, potentially improving the security of BYOD schemes within the enterprise.
A phishing campaign jumping on the Bitcoin bandwagon is targeting organizations within the media, high-tech, education, finance and manufacturing industries.
Symantec is aggressively pushing its managed security business, and will do so through its newest security operations centre in Sydney.
The attack affected customers in 24 states, but was limited because UPS Store franchised locations run on isolated networks.
Proposal focuses on balancing national security and end-user privacy.
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
Still reeling from the 2013 data breach, US retailer Target is weighed down with a financial burden that is hurting investors.
Julian Assange (remember him from WikiLeaks?) wants out of the Ecuador embassy and no one cares. It looks like IBM's hardware sale to Lenovo is going through. Plus lots more worldwide government IT news.
File-encrypting ransomware keeps rolling in with a new gang that appears to be beta-testing its product.
Dropbox's Mailbox is also making waves as the mobile mail sorter moves to Mac.
The Linux Foundation is strengthening the walls around the Linux kernel's source code Git repositories.
Some commentators have questioned if anything has changed, diplomatically and legally, in WikiLeaks' founder Julian Assange's case. Here's what could happen next.
The benefits are large and the privacy concerns are phony. Police should have cameras on them and the more cameras in public places, the better.
The NSW government plans to create a new identity management solution to remove the complexities related to user account administration and password management for its agencies.
Community Health Systems, a US chain of more than 200 hospitals, said patient information such as names, addresses and social security numbers were stolen in the attack.