Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
New versions fix eight security vulnerabilities, several of which could result in system compromise.
Both security incidents occurred overnight involving a local mobile operator and entertainment company, putting customer data at risk and questioning the ability of enterprises in the country to adequately protect their clients.
Installation problems block one of the updates for Lync Server 2010 in MS14-055.
A security flaw in Amazon's website can lead to malicious links being added to Kindle e-books, which one researcher says can be used to compromise a person's Amazon.com account.
The fines threatened against Yahoo for failing to "join" the NSA's PRISM program would have thrown the company into financial turmoil. The company's lawyers speak out.
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
If you don't know your passwords, they can't be phished. The domain of the site may be obscure to you, but the password manager knows.
Apple has said it will protect personal information collected through Health apps and the Apple Watch, but regulators in the US want to know how it will monitor and enforce privacy policies.
The long and sordid story of WikiLeaks takes an astonishingly irresponsible and very dangerous turn.
Attorney-General Brandis needs to forget categorising personal data by how it is collected, and focus on whether its use to solve crime justifies invading our privacy.
Demands for user data requests have more than doubled in five years, with the U.S. government leading pack in the global intelligence gathering race.
Even if we accepted the ridiculous premise that privacy is at odds with progress, no it's not too late, for a couple of reasons.
Edward Snowden and Glenn Greenwald have accused New Zealand's prime minister of deception over new internet laws. John Key responded by declassifying documents that he says prove he never implemented plans for mass surveillance.
It looks like the infiltrators had a look around in JPMorgan's June security breach -- but did not manage to siphon customer funds from bank accounts.
The research firm claims that 75 percent of all mobile applications will fail basic security tests next year -- leaving the enterprise vulnerable.