Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Despite early glimmers of recovery already, eBay's CFO lamented that “the Marketplaces business has to dig itself out of a hole."
This isn't the first time BlackBerry has taken a public potshot at a rival, but in the Blackphone case, the firm has met its mouthy match.
The speedy passage of the data retention and investigatory powers is drawing all sorts of invective. We just need to calm down and have a little faith, don't we?
Here are six top-quality scanners that will help you clean up systems and keep them safe in the future. There are tools here for systems ranging from Windows XP to Windows 8.1.
Search giant has revealed that it has put together a team of security researchers that will target finding zero-day exploits, regardless of whether they exist in Google software or not.
Learn how to create a security culture within your organization for an added layer of IT protection.
Today's quarterly update affects over 100 versions of 44 products including the Oracle database, Java and PeopleSoft Enterprise.
Through Project Zero, Google will pay researchers to report information about vulnerabilities in third-party programs.
New managed cloud models, service-level agreements and pricing are Rackspace's way of saying if you want cheap, commodity cloud, look elsewhere.
The Internet of Things, cognitive technology, 3D printing, wearable technology and similar innovations represent challenges which IT manager must face up to if they are not to be marginalised, says Gartner.
A fresh set of documents leaked by Edward Snowden show how the UK intelligence agency can manipulate online polls and debates, spread messages, snoop on YouTube and track Facebook users.
The public disclosure of emails by former NSA contractor, Edward Snowden, could be an "unwarranted invasion of personal privacy", according to a letter fro the US Department of State responding to a FOIA request by online publication, The Desk.
Stephen Frede has been in the thick of IT security management for over 20 years. In this interview he shares some security management principles and practices with ZDNet's readers.
A total of 28 observations were made by the Murray Inquiry into the Australian financial sector, including how the existing system needs a single strategy in place to look at various technology-related polices and strategies.
We don't need more tanks, we need the latest in cyber warfare, says UK PM David Cameron.