Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
The most tech-savvy U.S. president to date, Barack Obama uses the best devices and technology for the job, in and outside of the White House. Here's a look at some of the devices, platforms and technology he uses to carry out his day-to-day presidential duties.
In their latest October 2013 survey released just in time for All Hallows' Eve, IT recruiting firm Modis surveyed 1000 Americans to find out what potential tech disasters are keeping them up at night.
iOS 7 is a major step forward in enterprise mobile security. Apple has institutionalized security techniques for which, until now, enterprises had to go to an independent MDM/MAM vendor.
Groundbreaking Balkan hacker conference BalCCon: First Contact brought hackers from all over the world to its successful launch and makes plans for next year's edgy event.
This weekend the Balkan Computer Congress BalCCon: First Contact is putting Balkan hackers center stage with international hackers at the first-ever Balkan hacker conference.
The Internet of Things will complicate security, redefine privacy, and require new laws. Both business and government must rise to the challenge -- and they need to get started right now.
The limited edition security themed playing cards from Firehost handed out at Black Hat USA have hackers as jokers, and more hidden surprises in the artwork than you'd expect.
In its 21st year, world-famous hacker conference DEF CON welcomed over 15,000 hackers to Las Vegas and featured hackers and their tools, a Bitcoin briefcase ATM, and more.
As the world's most famous hacker conference, DEF CON celebrated its 21st year with record attendance, a no-Feds policy, Prism and Snowden themes, an official documentary and the usual subversive shenanigans.
Black Hat USA 2013 vendor area included companies such as Veracode, Booz Allen Hamilton and Microsoft, with creative schwag such as Botnets for Breakfast (cereal) and 'hacker' playing cards.
Leading security conference Black Hat 2013 boasts over 100 talks that include hacking nuclear facilities, rooting SIM cards, OPSEC failures of spies, a keynote from the NSA and more.
During his packed Black Hat USA keynote NSA Director Keith Alexander assured the crowd that the NSA's surveillance programs are lawful interception; attendees did not hesitate to shout "Bullshit."
Hold onto your tin hats as we're sure to experience even more cyber-threats for the rest of the year
AusCERT has returned to the Gold Coast for another year, and ZDNet was there to bring you all the highlights.
Amid a serious security flaw in the latest version of Java 7, where even the U.S. Department of Homeland Security has warned users to disable the plug-in, here's how you do it.