Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
CloudFlare's analysis Friday that Heartbleed may not be able to recover private keys turns out to be wrong. Two candidates recovered the keys from their challenge server.
While Heartbleed client-side attacks are possible, the SANS Institute warns that home users rushing to patch are more at risk of falling for scams — but change passwords regardless.
Dropbox experiences some more growing pains, but this time the hubbub concerns privacy and PR versus performance issues.
The broadening of the FTC's powers to include cybersecurity and lawsuits over security breaches extends the government's ability to destroy businesses.
[UPDATED] Research by CloudFlare indicates that Heartbleed can be used to obtain contents of server memory, but not private keys.
There have been some pretty bad vulnerabilities before Heartbleed. Is it really any more severe than CodeRed or Blaster?
With the multitudes of accounts we have to deal with for email, social networking and other applications that require password authentication, we need a better solution.
With vulnerabilities such as Heartbleed and Pileup likely to go unpatched on tens, if not hundreds of millions of Android devices, the platform is fast becoming a toxic hellstew that should send chills down the spines of IT admins.
Apple iOS and OS X devices aren't affected by the Heartbleed bug, but BlackBerry's BBM and Secure Work Spaces are — and the company says it lacks a fix for the issue.
The programmer responsible for code leading to Heartbleed says the flaw was accidental, despite its catastrophic consequences.
Kingsoft Cloud Group officially launches its full suite of cloud services including hosting, storage, and developer database, and hopes its links with security and smart devices will give the company a competitive advantage.
Sophos' James Lyne delivers an impassioned speech on how we got to the point Heartbleed was possible and why we shouldn't be surprised it happened.
Australia's competition watchdog has reported that it inadvertently published user email addresses online.
Lack of patches and upgrade paths for Android is leaving devices vulnerable to Heartbleed exploits, security researchers from the SANS Institute and Sophos have said.
The companies know what to do about Heartbleed now. Here's what you, as an individual, need to do now.