Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Australian Security Intelligence Organisation Director-General David Irvine has said critics of the controversial data retention proposals fail to understand the safeguards in place.
Attorney-General Brandis is failing to join the dots when it comes to new ASIO powers and the push for mandatory data retention laws.
New research suggests that 'government-grade' malware designed to operate undetected on computer systems is in the hands of cybercriminals who are integrating it into rootkits and ransomware.
New York has published its proposals for how a new framework for Bitcoin companies, putting a lot more red tape around the emerging industry.
It has been a record year for the Information Commissioner's Office in prosecutions and penalties, but the information age keeps piling on the pressure.
Learn how to create a security culture within your organization for an added layer of IT protection.
Australian daily deals website Catch of the Day announced a three-year-old data breach compromising credit cards and passwords to its customers on Friday evening.
A new global data security survey by the Ponemon Institute has found Australia’s IT security professionals believe that company executives would prefer to spend money on the protection of intellectual property over customer data security.
The former government contractor who leaked tens of thousands of NSA documents warned users to be more privacy conscious when it comes to online cloud storage.
A flaw in many of the company's cable modems and residential gateways could allow a remote attacker to take control of the device.
Since May, security firm Sucuri has discovered critical WordPress plugin vulnerabilities affecting four plugins that have nearly 20 million downloads.
DDoS-style attacks have been on the rise in the last year, although recent studies have suggested enterprise IT departments have been shoring up security infrastructures finally.
George Hotz, best known for hacking Sony's PS3 and the iPhone, has been snapped up for Google's vulnerability research team Project Zero.
According to new research, the first half of 2014 has seen the most volumetric DDoS attacks on record.
In one brief letter, the Australian government has shown that it's clueless about both technology and democracy.