Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Buggy updates are certainly a problem, but the company's poor communication of the problems is an even bigger cause for concern.
JPMorgan is reportedly one of multiple US banks which have suffered network breaches resulting in the loss of customer data.
Microsoft is toughening its stance on rogue apps in the Microsoft Store and Windows Phone Store.
The Australian government has been discussing a detailed data-retention wish list with internet service providers for more than four years — with citizens kept in the dark.
The Australian Federal Police inadvertently let sensitive metadata from an active criminal investigation be published online, after providing documents that had not been redacted to Greens Senator Scott Ludlam.
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
The ease of technical bypasses to avoid being captured by a mandatory data-retention regime is not a concern to ASIO director-general David Irvine.
UPDATED. A new version of MS14-045 has been pushed to Windows Update and the Download Center. Microsoft strongly recommends that users uninstall the old version first.
The latest security audits also blanket additional coverage for Google+ and Hangouts.
The USB Condom is a small and unobtrusive dongle that effectively turns any USB cable into a secure 'charge-only' cable to allow safe recharging from untrusted USB ports.
Microsoft withdrew support for Windows XP in April. That's been the cue for some in the developer community to work on new service packs for the elderly operating system.
IT security vendor sets up research facility in the Asian market to support threat intelligence as well as emergency threat response.
Within IoT, 'security has to live at the level of the API, to stay fully within the control of devices' manufacturers and vendors.'
UPDATED. The search giant said it wished it served up "micropigs" instead, after a Russian car crash image dogged users of its image search engine.
Can the QR code replace user names and passwords? Verizon Enterprise thinks so -- at least for some companies looking at two-factor authentication.