Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Eldo Kim, Harvard student, wanted to get out of a final exam so he sent in a bomb threat using Tor to disguise his location and identity. Tor's not magic and the FBI caught him anyway.
One thing Apple is doing right — partly — is the password manager functionality built into Keychain in iOS 7 and Mavericks. Nobody does it completely right, and right now it's probably impossible to do so. But there is a way to make it all work.
In wake of the Snowden leaks, concerns about data security and privacy have risen sharply.
If you think just because you use different passwords for different services you're safe, think again
Adding numbers, reversing or using 'l33t speak' to differentiate passwords on different accounts does avoid password re-use, but it's an ineffective way of adding security to online accounts.
How much do you love your country? Enough to shop until you drop, choosing just the right gifts? If you're stumped on exactly what to give your favorite nation, we have the answers. Come on in!
Microsoft is phasing out its Forefront Unified Access Gateway management product. But another Forefront Identity Manager release is coming in 2015.
I get a lot of security predictions pitched at me and I was intrigued by quite a few this year. There's good and bad news, and good and bad predictions.
The whistleblower asks Brazilian government asylum for the second time
Read the letter from the NSA whistleblower to the Brazilian people
CA CEO Michael Gregoire talks innovation, organic development, keeping engineering talent and the quickly changing software business model.
The outspoken security expert has left his position as 'security futurologist' at U.K. telecommunications giant BT.
Apple's Mavericks 10.9.1 delivers further improvements to its Mail client for Gmail users and some important security fixes for flaws in Safari.
The number of attacks could spike as millions are expected to receive games as presents in the holiday season, especially with the launch of newer consoles like PlayStation and Xbox, says Kaspersky Lab.
Hosting a Word document or a PowerPoint slide could be all that is needed to steal an organisation's SharePoint credentials.
Password alternatives look to hit stride in 2014 and end-users are key to success.