Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
The limited edition security themed playing cards from Firehost handed out at Black Hat USA have hackers as jokers, and more hidden surprises in the artwork than you'd expect.
In its 21st year, world-famous hacker conference DEF CON welcomed over 15,000 hackers to Las Vegas and featured hackers and their tools, a Bitcoin briefcase ATM, and more.
As the world's most famous hacker conference, DEF CON celebrated its 21st year with record attendance, a no-Feds policy, Prism and Snowden themes, an official documentary and the usual subversive shenanigans.
Black Hat USA 2013 vendor area included companies such as Veracode, Booz Allen Hamilton and Microsoft, with creative schwag such as Botnets for Breakfast (cereal) and 'hacker' playing cards.
Leading security conference Black Hat 2013 boasts over 100 talks that include hacking nuclear facilities, rooting SIM cards, OPSEC failures of spies, a keynote from the NSA and more.
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
During his packed Black Hat USA keynote NSA Director Keith Alexander assured the crowd that the NSA's surveillance programs are lawful interception; attendees did not hesitate to shout "Bullshit."
Hold onto your tin hats as we're sure to experience even more cyber-threats for the rest of the year
AusCERT has returned to the Gold Coast for another year, and ZDNet was there to bring you all the highlights.
The U.S. Sentencing Commission website has been hacked a second time. A code distributed by Anonymous "Operation Last Resort" turns ussc.gov into a game of Asteroids.
Amid a serious security flaw in the latest version of Java 7, where even the U.S. Department of Homeland Security has warned users to disable the plug-in, here's how you do it.
A look back at the hot topics, major discoveries, and technological breakthroughs of 2012: from privacy to surveillance, major product launches, successes and catastrophes.
ZDNet looks back at the year, on a month-by-month basis, at some of the most publicized hacks, leaks and data breaches of 2012.
Thanksgiving is over, and we're heading into December. It's time for a look back at all the blunders, catastrophes, epic fails and major screw-ups of 2012.
A look back at some of the successes and victories, the bad times and controversies, and the downright ugly failures by Twitter and by its users, during 2012.