Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
A new report says the majority of attacks experienced by higher education institutions come from malware infections, and most universities are ill equipped to prevent and handle such attacks.
It's been just over one month since Violet Blue switched from being a lifetime Apple and Android user to trying out a Nokia 925. Our newest Windows Phone user has a few things to say.
Modifications to the core Android operating system would allow companies to plug in security enhancements for mobile devices, potentially improving the security of BYOD schemes within the enterprise.
A phishing campaign jumping on the Bitcoin bandwagon is targeting organizations within the media, high-tech, education, finance and manufacturing industries.
Symantec is aggressively pushing its managed security business, and will do so through its newest security operations centre in Sydney.
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
The attack affected customers in 24 states, but was limited because UPS Store franchised locations run on isolated networks.
Proposal focuses on balancing national security and end-user privacy.
Still reeling from the 2013 data breach, US retailer Target is weighed down with a financial burden that is hurting investors.
Julian Assange (remember him from WikiLeaks?) wants out of the Ecuador embassy and no one cares. It looks like IBM's hardware sale to Lenovo is going through. Plus lots more worldwide government IT news.
File-encrypting ransomware keeps rolling in with a new gang that appears to be beta-testing its product.
Dropbox's Mailbox is also making waves as the mobile mail sorter moves to Mac.
The Linux Foundation is strengthening the walls around the Linux kernel's source code Git repositories.
Some commentators have questioned if anything has changed, diplomatically and legally, in WikiLeaks' founder Julian Assange's case. Here's what could happen next.
The NSW government plans to create a new identity management solution to remove the complexities related to user account administration and password management for its agencies.