Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Controversial Global hacking conference Hack In The Box just celebrated its ten-year mark in Kuala Lumpur, Malaysia. The event attracted hackers from all over the world and company participants that included Google, Mozilla, Microsoft, Amazon, sponsor 'friends' such as Megaupload, and many more.
Notorious security conference Hack In The Box is about to celebrate its ten year mark in Kuala Lumpur, Malaysia. Doors open to conference participants tomorrow, and we caught a few moments of setup in its calm before the storm.
Cybercriminals are increasingly targeting Google's Android operating system due to its popularity, so we spotlight 5 security apps that would help users in protecting their personal data and devices.
Despite Wikileaks' founder Julian Assange's successful asylum bid, he picked the worst embassy to try and escape from. Here's why, and how he could possibly evade the U.K. authorities.
Wikileaks founder Julian Assange gave a statement to protesters and the media from the Ecuadorian embassy in London on Sunday.
From Defcon 2012, probably the biggest hacker conferences of the year, we'll take you on a tour of some of the more interesting sights at this year's show. You'll see hacker ware, fake iPads, mysterious machines, schwag and much more.
The explosion of malware attacks and high-profile password and data breaches serve as confirmation that resourceful hackers are determined to break into your computer and online accounts. It's time to pay attention to these issues and follow some basic steps to stay secure while using your PC and surfing the web.
The Science Museum in London is celebrating the centenary of computing pioneer Alan Turing, whose work helped shorten World War II, laid the groundwork for modern computers, and set the standard test for artificial intelligence
Last week, Kroll Ontrack opened a new clean room facility for data recovery in Brisbane. We take a peek inside the operation of the facility.
Some of the most high-profile computing criminals and alleged hackers - and it seems many turn to journalism after.
When you've lost a critical password for a system you administer, one of these tools may save the day.
The 2012 AusCERT conference continues with Star Wars, censorship, cyber attacks and machines becoming self-aware.
The 11th annual AusCERT information security conference kicked off this morning, with the theme "Security on the move".
They don't make malware like they used to. Literally.Back in 2002, Microsoft and its customers were forced to deal with an unprecedented outbreak of attacks on Windows that threatened the company's survival. In this gallery, I show how malware authors and Microsoft's security response have evolved over the past decade.
Just because you don't have an iPhone doesn't mean that you can't produce superior photos - with the help of Android apps.