Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
What are some simple tips, tricks and best-practice methods of keeping yourself and your digital identity safe from hackers?
Behind on the news and hungry for more? Here's what we learned this week — from tweets leading to bank hacks, Windows XP lives, and who is the elusive Bitcoin inventor?
There are many reasons why users will be sticking with Windows XP after Microsoft ends all support next month. In the final analysis, none of them are good excuses.
Behind on the news and hungry for more? Here's what we learned this week — from webcam hacking, net neutrality, and all the things that are cheaper to buy than WhatsApp.
At informal infosec conference Security B-Sides SF, former Black Hat General Manager and current Global Strategist for Rapid7 Trey Ford outlined the gaps between hacking and legislation in America.
Learn how to create a security culture within your organization for an added layer of IT protection.
From snow cannons to deep-packet network inspection and aerial drones, here's some of the gadgets and technologies powering the Sochi 2014 Olympic Games.
Researchers shared their discovery and research on espionage malware "The Mask" (aka Careto) at the Kaspersky Labs security summit this week. ZDNet took photos of the presentation.
Exploring this Debian GNU/Linux derivative that is tightly focused on security analysis and penetration testing - and it comes with a mind-boggling array of utilities for that pupose.
Infamous security researcher Felix "FX" Lindner exposed Lawful Interception surveillance systems as easy to detect, derail, and maliciously exploit at European hacking conference 30c3.
One of our audience members asked how to back up an Office 365 document locally. It actually turns out to be pretty simple. Read this guide for the step-by-step process (which works with other Exchange servers, too).
The latest leaked documents from the NSA reveal a long collection, from 2007-2008, of software and hardware used to spy on computers, networks and to capture audio and video.
How much do you love your country? Enough to shop until you drop, choosing just the right gifts? If you're stumped on exactly what to give your favorite nation, we have the answers. Come on in!
Welcome to the official 2013 edition of our ZDNet DIY-IT Gift Guide. This year, in honor of 2013, we present to you 14 interesting and useful products that the DIY-ITer in your life will find particularly useful, fun, or cool.
Which products, platforms, and big ideas made the most impact in 2013?