Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
A total of 28 observations were made by the Murray Inquiry into the Australian financial sector, including how the existing system needs a single strategy in place to look at various technology-related polices and strategies.
As the Secret Service says, business center PCs can be dangerous. The only safe way to use such devices is not to use the installed OS.
We don't need more tanks, we need the latest in cyber warfare, says UK PM David Cameron.
Hotels that offer business centers, equipped with PCs and other office machinery, are being targeted by hackers, the US Secret Service warns.
A statement by an Oracle executive affirms that Java 7 and updates to it should continue to work on Windows XP. Java 8 is a different story.
Learn how to create a security culture within your organization for an added layer of IT protection.
The company's quarterly update will address problems in "hundreds of Oracle products."
FTC sues Amazon, China bickers with Apple, and MS looks into right-to-be-forgotten [Government IT Week]
There's a Zune or BlackBerry gag there, but we'll just let it pass. This week, Apple is not only the bling to swing in China, but is accused of being a national security concern. Mix location tracking with selfies and who knows what you'll get? Click on in to read some more worldwide IT government news.
The UK spy agency's Tempora project is under scrutiny by regulators as part of a hearing demanded by civil liberty groups.
As the cybersecurity row between the US and China escalates, another Chinese man has been arrested on hacking and data theft charges.
iPhone maker dismisses suggestions that the "frequent locations" function on the smartphone can monitor the location of the user's movements, noting that personal data is encrypted and stored locally on the device.
Another step towards LibreSSL's goal of replacing OpenSSL as the go-to library for transport layer security has occured, with an official portable version of the library now available for testing on systems other than OpenBSD.
Security architect Peter Benson is concerned New Zealand’s proposed data breach disclosure regime isn't strong enough.
The organisations that are looking to invent, and dominate the next era of computing are, at their heart, based on advertising revenue, and in the process of owning the future, these companies and their device-based competitors will treat the personal information of consumers as a prized commodity.
The notorious Shylock, a dangerous financial Trojan, has been disrupted due to the efforts of police and security experts.