Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
The Samsung Knox team boss tells how it all got started and how the Korean tech giant wants to evolve its touted mobile security solution for the global mobile workforces of today, reports ZDNet Korea's Cho Mu-hyun.
The Drupal 7 core is vulnerable to a "Highly Critical" SQL injection bug that could allow an attacker to compromise the site.
Intel Data Protection Technology for Transactions encrypts transaction data from end to end, even from card readers.
Snapchat says it does plan to release a public API, but until then is warning users against third-party Snapchat apps.
South Korea, one of the most wired countries in the world, has suffered over 106 million leaks of personal information by the negligence of private companies in the last four years, reports ZDNet Korea's Cho Mu-hyun.
BYOD means freedom of device choice for business users, but it can also unleash an avalanche of security concerns. This ebook will help you sort out the risks and take the right steps to contain...
It's no Heartbleed, but this problem in the obsolete SSL 3.0 is still sure to cause trouble.
If Dropbox is correct that the Pastebin file of passwords were all reused from other services then they are innocent. The users involved are guilty of laziness.
Cisco has announced a global consortium to reskill IT workforces for the shift to Internet of Things.
A total of 24 vulnerabilities, many severe and a few being exploited in the wild, have been revealed and patched.
If you believe that you have "nothing to hide" from the prying eyes of the NSA, you shouldn't mind letting a stranger rifle through your bank statements, emails, and photos — right?
UPDATED. Today's updates address serious holes in Windows that have been exploited for some time. The attackers exhibit a high level of sophistication.
Updates fix three critical vulnerabilities in Flash Player and ColdFusion. None are known to be exploited in the wild.
According to security experts, the cryptocurrency community needs to grow up in order to thrive -- and become more like the establishment it originally tried to break away from.
Digital forensics firm Cellebrite has moved from copying contacts on mobile phones to digital forensics, helping police collar the bad guys along the way.