Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
A look back at some of the successes and victories, the bad times and controversies, and the downright ugly failures by Twitter and by its users, during 2012.
During the year, we have seen the destruction of SOPA and PIPA but the emergence of CISPA and similar laws around the world, a growing trend in hacks and scams, an explosion in malware, and states committing cyberwarfare on their friends and foes. Here's a run-down of what happened in 2012.
Controversial Global hacking conference Hack In The Box just celebrated its ten-year mark in Kuala Lumpur, Malaysia. The event attracted hackers from all over the world and company participants that included Google, Mozilla, Microsoft, Amazon, sponsor 'friends' such as Megaupload, and many more.
Notorious security conference Hack In The Box is about to celebrate its ten year mark in Kuala Lumpur, Malaysia. Doors open to conference participants tomorrow, and we caught a few moments of setup in its calm before the storm.
Cybercriminals are increasingly targeting Google's Android operating system due to its popularity, so we spotlight 5 security apps that would help users in protecting their personal data and devices.
Despite Wikileaks' founder Julian Assange's successful asylum bid, he picked the worst embassy to try and escape from. Here's why, and how he could possibly evade the U.K. authorities.
Wikileaks founder Julian Assange gave a statement to protesters and the media from the Ecuadorian embassy in London on Sunday.
From Defcon 2012, probably the biggest hacker conferences of the year, we'll take you on a tour of some of the more interesting sights at this year's show. You'll see hacker ware, fake iPads, mysterious machines, schwag and much more.
The explosion of malware attacks and high-profile password and data breaches serve as confirmation that resourceful hackers are determined to break into your computer and online accounts. It's time to pay attention to these issues and follow some basic steps to stay secure while using your PC and surfing the web.
The Science Museum in London is celebrating the centenary of computing pioneer Alan Turing, whose work helped shorten World War II, laid the groundwork for modern computers, and set the standard test for artificial intelligence
Last week, Kroll Ontrack opened a new clean room facility for data recovery in Brisbane. We take a peek inside the operation of the facility.
Some of the most high-profile computing criminals and alleged hackers - and it seems many turn to journalism after.
When you've lost a critical password for a system you administer, one of these tools may save the day.
The 2012 AusCERT conference continues with Star Wars, censorship, cyber attacks and machines becoming self-aware.
The 11th annual AusCERT information security conference kicked off this morning, with the theme "Security on the move".