Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Apple's new iPhone-based payment system may offer advantages, as will any similar product from competitors. But adding in a smartphone doesn't add privacy, it removes it.
The Australian financial regulatory agency that accidentally blocked 250,000 websites due to a lack of technical knowledge is now pushing to have the power to intercept telecommunications information to investigate financial crime.
End-users will ultimately decide on the success of multi-factor authentication. Will the newest efforts toward that end help them make up their minds?
Need an anti-spying solution designed to lock down your messages and protect your privacy? One smartphone case maker promises as much, but only proves a fraction of its claims.
A collection of notable security news items for the week ending October 24, 2014. Covers enterprise, controversies, reports and more. UPDATED.
The Internet of Things will complicate security, redefine privacy, and require new laws. Both business and government must rise to the challenge -- and they need to get started right now.
Google's WebView for Android will get updates from Google Play, enabling faster security and feature updates.
In a move that has surprised and angered security researchers, chip maker FTDI has admitted to issuing a silent update that bricks cloned FTDI FT232 [USB to UART] chips. UPDATED.
Kit lets app devs give end-users ability to use phone number for sign-up and log-in
Turns out there was a bit of a vulnerability (and lack of communication) between Yahoo and Facebook. Whoops!
This absorbing documentary follows film-maker Laura Poitras and journalist Glenn Greenwald as they make contact with the whistleblower and unleash a media storm.
If iOS and OS X developers want their notifications to reach end users, they should start supporting TLS now.
Xiaomi is moving its services and user data to the cloud ahead of a push into markets outside of China.
Days after the iPhone 6 launched in mainland China, Apple wants to assure the Chinese government that the new device is safe and has no backdoors.
Windows 10 will build in standards-based two-factor authentication to every device, effectively neutering most phishing attacks and password database breaches. The company also announced new features aimed at securing corporate machines from malware attacks and data leaks.