Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Recent security incidents and evolving legislations, including cross-border policies, highlight the need for businesses and consumers to assess potential risks and decide how much they are willing to absorb.
The decision to hire a "head of law enforcement" comes in response to Apple moving to store some Chinese data to servers based on the country's soil.
Businesses need security tools that are integrated, coordinated, and able to communicate with each other across the network to provide unified "context-aware" protection, says Sophos CTO.
The iPhone and iPad maker is encrypting its services, end-to-end, in a bid to prevent law enforcement (even with a search warrant) from accessing your device data.
The Enhanced Security Clearance Act of 2014 (HR 5482) hopes to employ 'social media screening' to flag violent psychopaths, and prevent the next Edward Snowden from getting a clearance.
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
Many severe vulnerabilities are fixed in the new version and remain in iOS 7.1.
The parliamentary committee reviewing the first stage of the government's national security reforms has called for a review of how ASIO handles individuals' information, and whether it should be destroyed when it is no longer required for an investigation.
Users are still clinging to hopes for the best without preparing for the worst, even with two-factor authentication and identity management advancements.
People working in IT broadly comprehend the threat the use of cloud services could pose to corporate data but that understanding is no substitute for detailed insights, according to Netskope CEO Sanjay Beri.
Before you sync your iCloud or reinstall your apps, you need to lock down your iPhone or iPad. Here are seven important tweaks (and more) you can set to bolster your privacy.
As part of a the Victorian Review of Counter-Terrorism Legislation, Victoria Police will receive extended powers to remotely access people's computers for terrorist-related investigations.
Apple has activated a two-factor authentication process for iCloud access, requiring users to enter a dynamically generated pass code in addition to login and password details.
Cisco has launched Cisco ASA with Firepower Services, a threat-focused firewall aimed at providing businesses with controls to assess threats, correlate intelligence, and optimise defences to protect networks.