Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
One of our audience members asked how to back up an Office 365 document locally. It actually turns out to be pretty simple. Read this guide for the step-by-step process (which works with other Exchange servers, too).
The latest leaked documents from the NSA reveal a long collection, from 2007-2008, of software and hardware used to spy on computers, networks and to capture audio and video.
How much do you love your country? Enough to shop until you drop, choosing just the right gifts? If you're stumped on exactly what to give your favorite nation, we have the answers. Come on in!
Welcome to the official 2013 edition of our ZDNet DIY-IT Gift Guide. This year, in honor of 2013, we present to you 14 interesting and useful products that the DIY-ITer in your life will find particularly useful, fun, or cool.
Ada's Technical Books in Seattle recently relocated, adding a cafe and more technical science, security, sci-fi and engineering books than before into its breathtaking new location.
Which products, platforms, and big ideas made the most impact in 2013?
Thanksgiving is over, and we're already deep into December. It's time for a look back at all the blunders, catastrophes, epic fails and major screw-ups of 2013.
From Facebook to Adobe, 2013 has been a tough year for companies looking to defend against cybercrime.
And now, for your reading pleasure, the very worst from the tech world in 2013.
The U.S. government mass surveillance scandal may be the biggest ongoing story of the year. In this updating timeline, you can explore the full scope of the Edward Snowden leaks, which have implicated the world's most powerful nations in the worldwide spying operation.
On the fifth day of Christmas, my true love gave to me, an app which stole my identity.
The most tech-savvy U.S. president to date, Barack Obama uses the best devices and technology for the job, in and outside of the White House. Here's a look at some of the devices, platforms and technology he uses to carry out his day-to-day presidential duties.
In their latest October 2013 survey released just in time for All Hallows' Eve, IT recruiting firm Modis surveyed 1000 Americans to find out what potential tech disasters are keeping them up at night.
iOS 7 is a major step forward in enterprise mobile security. Apple has institutionalized security techniques for which, until now, enterprises had to go to an independent MDM/MAM vendor.
Groundbreaking Balkan hacker conference BalCCon: First Contact brought hackers from all over the world to its successful launch and makes plans for next year's edgy event.