Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Cloud security platform provider CipherCloud has picked up $50 million in a funding round, which was led by Transamerica Ventures.
The Windows KDC didn't properly validate parts of Kerberos tickets. It may be possible for admins to detect if they have been exploited.
Not all buzzwords are bad. Some actually convey an idea, a concept, or a valid technology. However, some exist to confuse, distort, and empower those who don't want you to know what they're talking about.
The latest stable version of Chrome removes the source of the POODLE bug and SSLv3 support will be out altogether over time. The Canary version disparages implementations not up to standards.
The top security threats of 2014 include equal parts old mistakes, new adversaries, innocent human nature and the evils that people do.
The Internet of Things will complicate security, redefine privacy, and require new laws. Both business and government must rise to the challenge -- and they need to get started right now.
Let's Encrypt, a new free certificate authority, will try to accelerate the use of encryption on the web.
You might not hire a pickpocket to be a guard, but the UK's cybersecurity shortage has prompted a skill hire, no matter the origin.
From drug cartels to passwords, security expert Brian Krebs weighs in on how to keep your personal data and bank account safe.
It's all about the network.
The Bill to curb NSA surveillance has been voted down after it failed to gain 60 votes in the US Senate on Tuesday night.
Microsoft is rebranding again its identity-manager security offering and making a public preview version of a new release.
Problems with the update affected only Windows Server 2008 R2 and Windows Server 2012. The new update does not apply the new TLS ciphers by default.
A privilege escalation bug being exploited in the wild could turn a normal user into a domain administrator.
Just how many hidden Tor services seized by law enforcement were genuine websites, and how many were clones and copies?