Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Since May, security firm Sucuri has discovered critical WordPress plugin vulnerabilities affecting four plugins that have nearly 20 million downloads.
DDoS-style attacks have been on the rise in the last year, although recent studies have suggested enterprise IT departments have been shoring up security infrastructures finally.
George Hotz, best known for hacking Sony's PS3 and the iPhone, has been snapped up for Google's vulnerability research team Project Zero.
According to new research, the first half of 2014 has seen the most volumetric DDoS attacks on record.
The Tel Aviv company issued a blog post about a new twist on a known Active Directory security hole – which was followed up by reports that Microsoft might buy the company.
Learn how to create a security culture within your organization for an added layer of IT protection.
In one brief letter, the Australian government has shown that it's clueless about both technology and democracy.
Despite early glimmers of recovery already, eBay's CFO lamented that “the Marketplaces business has to dig itself out of a hole."
This isn't the first time BlackBerry has taken a public potshot at a rival, but in the Blackphone case, the firm has met its mouthy match.
The speedy passage of the data retention and investigatory powers is drawing all sorts of invective. We just need to calm down and have a little faith, don't we?
Here are six top-quality scanners that will help you clean up systems and keep them safe in the future. There are tools here for systems ranging from Windows XP to Windows 8.1.
Search giant has revealed that it has put together a team of security researchers that will target finding zero-day exploits, regardless of whether they exist in Google software or not.
Today's quarterly update affects over 100 versions of 44 products including the Oracle database, Java and PeopleSoft Enterprise.
Through Project Zero, Google will pay researchers to report information about vulnerabilities in third-party programs.
The Internet of Things, cognitive technology, 3D printing, wearable technology and similar innovations represent challenges which IT manager must face up to if they are not to be marginalised, says Gartner.