Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
If you believe that you have "nothing to hide" from the prying eyes of the NSA, you shouldn't mind letting a stranger rifle through your bank statements, emails, and photos — right?
UPDATED. Today's updates address serious holes in Windows that have been exploited for some time. The attackers exhibit a high level of sophistication.
Updates fix three critical vulnerabilities in Flash Player and ColdFusion. None are known to be exploited in the wild.
According to security experts, the cryptocurrency community needs to grow up in order to thrive -- and become more like the establishment it originally tried to break away from.
iSight says the "Sandworm" team has targeted NATO, the European Union, Ukraine and industry through a previously unrecognized Windows zero-day exploit.
BYOD means freedom of device choice for business users, but it can also unleash an avalanche of security concerns. This ebook will help you sort out the risks and take the right steps to contain...
Digital forensics firm Cellebrite has moved from copying contacts on mobile phones to digital forensics, helping police collar the bad guys along the way.
The supposed Dropbox hack that's really a five-cent scam tells us something important: Information security shouldn't be here, and it's mostly the cloud providers' fault.
We have a new white-as-the-driven-Snowden story on the NSA, the UK's equivalent of the denied-but-not-forgotten PRISM program, a white hot (yet ultimately ridiculous) battle between Google and Oracle, and lots more from around the world.
This is your regularly scheduled reminder to turn on two-factor authentication where available.
The company is unveiling an option for developers to add extra strength and intelligence to the login process with policies, second-factor authentication and other techniques.
The latest Snowden leaks suggest the NSA has access to well-placed staff whose mission is to infiltrate companies to gather secret and sensitive corporate data.
Oracle has a large number of fixes lined up for Tuesday, including 25 for Java SE, while Microsoft and Adobe have patches due then too.
Security, document management, open architecture and the ability to manage users over devices are critical components when picking an enterprise mobility management platform. But focus will matter too.
British police can access millions of UK mobile customers' data without a warrant.