Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Our increasingly connected world is forging a new and complex threat landscape. This guide looks at the escalating security challenges and what you can do to mitigate the risks.
Traditional network and endpoint defence tools are necessary but no longer sufficient to defeat today's increasingly sophisticated cyberattacks. We outline the scale of the problem, and examine some next-generation solutions.
Security concerns, budgets, trends and future plans were the focus of a recent Tech Pro Research survey, in which 41 percent of respondents said they will spend more on IT security in 2014 compared to 2013.
Akamai Technologies has purchased Prolexic, a provider of cloud-based security solutions designed to shield the enterprise from denial-of-service attacks.
The head of IT strategy at Russia's biggest bank sees the cloud as a necessary evil and is investing in security startups to deal with hackers that want to get into its systems.
The recent edition of MacTech magazine offers a closeup look at new features added to the command-line tool fdsetup to manage FileVault 2 in OS X Mavericks. This offers many useful capabilities for Mac managers.
The Icelandic branch of Vodafone is in damage control after being breached and having its customer data leaked.
New Five Eyes slides leaked by NSA whistleblower Edward Snowden show that the Australian government was willing to share bulk uncensored metadata on Australian citizens with other nations.
ZDNetGovWeek: Yahoo decides to be unhelpful, so does the US, but HP is all about helping Healthcare.gov
Yahoo has decided that it's easier to call something a feature than a vulnerability (oh, joy), the US doesn't like the idea of privacy rights, despite a UN resolution (who's surprised?), Verizon didn't save ACA, so it's HP's turn at bat, and we run down all the tech turkeys we could think of (and speak politely about). So, did the tryptophan wear off yet? Welcome to the silly(er) season!
From organized criminals and state-sponsored actors to your own employees and IT staff, this field guide fills you in on the people who are attacking your network, and provides tips on how to fight back.
Used memory sticks being sold on the internet have been found to contain sensitive Australian government data, according to a new study.
New Zealand’s Office of the Privacy Commissioner has published data breach numbers and categories in its annual report for the first time.
Former NSA technologist Edward Snowden rocked the IT world in 2013 when he leaked classified documents revealing the agency's digital surveillance programs. Here are the three biggest impacts.
This year, the general public discovered the meaning of OPSEC, from Snowden to Silk Road. But which OPSEC fail was the worst of the worst?
The news comes not long after leaked documents showed the NSA was bugging and spying EU offices around the world. But the U.S. agency can likely be ruled out as a suspect in this latest hack, following reports from German media.