Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Groundbreaking Balkan hacker conference BalCCon: First Contact brought hackers from all over the world to its successful launch and makes plans for next year's edgy event.
This weekend the Balkan Computer Congress BalCCon: First Contact is putting Balkan hackers center stage with international hackers at the first-ever Balkan hacker conference.
The limited edition security themed playing cards from Firehost handed out at Black Hat USA have hackers as jokers, and more hidden surprises in the artwork than you'd expect.
In its 21st year, world-famous hacker conference DEF CON welcomed over 15,000 hackers to Las Vegas and featured hackers and their tools, a Bitcoin briefcase ATM, and more.
As the world's most famous hacker conference, DEF CON celebrated its 21st year with record attendance, a no-Feds policy, Prism and Snowden themes, an official documentary and the usual subversive shenanigans.
BYOD means freedom of device choice for business users, but it can also unleash an avalanche of security concerns. This ebook will help you sort out the risks and take the right steps to contain...
Black Hat USA 2013 vendor area included companies such as Veracode, Booz Allen Hamilton and Microsoft, with creative schwag such as Botnets for Breakfast (cereal) and 'hacker' playing cards.
Leading security conference Black Hat 2013 boasts over 100 talks that include hacking nuclear facilities, rooting SIM cards, OPSEC failures of spies, a keynote from the NSA and more.
During his packed Black Hat USA keynote NSA Director Keith Alexander assured the crowd that the NSA's surveillance programs are lawful interception; attendees did not hesitate to shout "Bullshit."
Hold onto your tin hats as we're sure to experience even more cyber-threats for the rest of the year
AusCERT has returned to the Gold Coast for another year, and ZDNet was there to bring you all the highlights.
The U.S. Sentencing Commission website has been hacked a second time. A code distributed by Anonymous "Operation Last Resort" turns ussc.gov into a game of Asteroids.
Amid a serious security flaw in the latest version of Java 7, where even the U.S. Department of Homeland Security has warned users to disable the plug-in, here's how you do it.
A look back at the hot topics, major discoveries, and technological breakthroughs of 2012: from privacy to surveillance, major product launches, successes and catastrophes.
Thanksgiving is over, and we're heading into December. It's time for a look back at all the blunders, catastrophes, epic fails and major screw-ups of 2012.