Security
Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Featured Stories
Related Topics
Articles about Security
Who has your back?
What do Apple, AT&T, Myspace, Verizon and Yahoo! have in common? Little regard for protecting their customers from governmental abuse of power.
Mozilla sends cease and desist to surveillance software maker
Mozilla has sent a cease and desist letter to the maker of surveillance software that identifies itself as Firefox when running on a victim's system.
'Sophisticated' backdoor malware opens up security blackhole in Apache web servers
Malware that hides itself from admins has been found in the wild, allowing attackers to compromise web servers and redirect users to sites hosting exploit kits.
Don't trust Apple, Verizon with your data, says EFF's privacy report
In its latest report, the U.S. privacy and civil liberties group warn that some companies should not be trusted with your data — but some should, and actively fight on the user's behalf.
Google Glass: Let the evil commence
Glass has now been 'jailbroken' with a well-documented exploit. So what can you (or others) do with a hacked headset? Apparently, a whole lot.
Windows 8 security for healthcare IT
In the healthcare world, subject to both HIPAA and HITECH regulations, security is critically important. This article dives into the Windows 8 security models and shows how Windows 8 provides strong security for healthcare deployments.
Spamhaus DDoS suspect to be extradited soon
A man accused of carrying out a massive denial of service attack is to be extradited from Spain.
Quarter of U.K. SMEs can't fend off cyberattacks, says research
According to the latest research, around one quarter of all U.K. small-medium sized enterprises do not have the resources to fend off cyberattacks or hackers.
Twitter warns of more hacks, threats to come; issues media memo
The microblogging giant has warned news outlets that "these attacks will continue," particularly against high profile media organizations.
Guardian Twitter accounts compromised, SEA takes credit
The Associated Press wasn't enough for the Syrian Electronic Army, which has now taken control of another publication's Twitter accounts.
S. Korea tops Asia's malware infection list
South Korea had the highest number of computers reporting detections and removals of malware among Asian states, which is "surprising" given its status as a mature IT market.
Hacking suspect arrested for 'biggest cyberattack in history'
Remember Spamhaus? The attack was apparently conducted not from a bedroom, but an antenna-equipped mobile van.
Australian organisations unprepared for new privacy laws: McAfee
As the Australian Privacy Commissioner and Attorney-general warn businesses to prepare themselves for upchanges to the Privacy Act, McAfee has found that most don't even realise that there are changes or fines for non-compliance.
Taiwan: China's cyberarmy shifting target to think tanks, telcos
Taiwanese government claims China's cyberarmy now employs more than 100,000 people, has a yearly budget of more than US$2.71 million and is now focusing on think tanks and firms responsible for critical infrastructure.
Prepare for Oz privacy reforms now: Attorney-general, privacy commissioner
With the changes to Australia's Privacy Act scheduled to take place in March 2014, the attorney-general and privacy commissioner have urged businesses to make necessary preparations to comply right now.