Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Apple is ramping up iCloud defences in the aftermath of hackers swiping nude photos of celebrities from the online digital vault.
On Tuesday, about the time that Microsoft issues its Patch Tuesday Windows updates, Adobe will release new versions of Reader and Acrobat.
No data or production systems were compromised. A test server, accidentally open to the Internet, was accessed through a default password.
I changed jobs to get a front-row seat to see if end-users can lead a culture shift and bring on stronger, more secure authentication
The XSLCmd backdoor, popular in targeted Windows attacks, has been around for weeks at a minimum and still no anti-malware products detect it.
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
Box is also boosting cross-enterprise visibility as well as Security and Event Management (SIEM) integrations with HP and Splunk.
A total of four updates will be released next Tuesday. One is a critical update for Internet Explorer.
LogMeIn acquired Y Combinator-backed startup Meldium on Thursday for $15 million, adding single-sign-on capabilities to its product portfolio.
The celebrity stolen nudes debacle has everyone talking about failed protections and victims. Violet Blue thinks it's time to talk about fighting back.
Twitter joins a growing number of companies opening to the crowd to keep its applications secure.
The tech giant's stock price has plummeted over the past 24 hours, sending Apple shares to a low not experienced since January.
According to new research, employees remain a link in the chain ripe for exploiting, and phishing campaigns are an effective tactic to gain access to corporate networks.
The privacy czar has floated the possibility of making re-identification of anonymised data illegal.
As the "Internet of Everything" becomes increasingly pervasive, more information about individuals will be collected and analyzed, giving cybercriminals even more to work with.