Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Cost benefits make it tough for enterprises not to adopt cloud services in spite of the security risks, so they should embrace it by putting in place the necessary processes, say panelists at a discussion moderated by ZDNet blogger Eileen Yu.
Challenges ahead, but three major deployments have consortium feeling it is in right place at right time with right ideas
The 'Highly Critical' vulnerability revealed two weeks ago was widely exploited just hours after it was announced. But there's no evidence yet of actual, widespread attacks.
CurrentC, the merchant's answer to NFC payment systems, has been hacked during its pilot program.
In the war against online security, the bad guys are winning. They steal our passwords, brute-force decrypt them, and take our money. We need better passwords, but only if we can remember them. Here's how to do that.
The Internet of Things will complicate security, redefine privacy, and require new laws. Both business and government must rise to the challenge -- and they need to get started right now.
Australia's two largest telecommunications companies have welcomed the Australian government's approach to legislation forcing them to retain customer data for two years.
Australian Communications Minister Malcolm Turnbull has this morning introduced legislation that will force telecommunications companies to retain customer data for two years.
Drupal has issued a highly critical announcement that unless Drupal installs were patched against the latest SQL injection attack within seven hours of its unveiling, the site should be considered compromised.
By default, Internet Explorer on Windows client systems supports SSL version 3.0, the version recently found vulnerable to attack. Now there's another way to turn it off.
The social network is also open sourcing an intrusion detection program touted to be comparable to commercial offerings at a fraction of the cost.
While IT departments are geared to scouring the internet for potential threats the biggest issue they see is the careless employee with mobile devices.
The Obama Administration has admitted that a cyberattacker was able to gain access to the US government's systems.
New McAfee research claims that a worrying number of organizations are turning off advanced firewall features in order to avoid slowing down networks.
The private eHealth records of numerous patients have been breached by healthcare providers and other myGov account users.