Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
In its 21st year, world-famous hacker conference DEF CON welcomed over 15,000 hackers to Las Vegas and featured hackers and their tools, a Bitcoin briefcase ATM, and more.
As the world's most famous hacker conference, DEF CON celebrated its 21st year with record attendance, a no-Feds policy, Prism and Snowden themes, an official documentary and the usual subversive shenanigans.
Black Hat USA 2013 vendor area included companies such as Veracode, Booz Allen Hamilton and Microsoft, with creative schwag such as Botnets for Breakfast (cereal) and 'hacker' playing cards.
Leading security conference Black Hat 2013 boasts over 100 talks that include hacking nuclear facilities, rooting SIM cards, OPSEC failures of spies, a keynote from the NSA and more.
During his packed Black Hat USA keynote NSA Director Keith Alexander assured the crowd that the NSA's surveillance programs are lawful interception; attendees did not hesitate to shout "Bullshit."
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
Hold onto your tin hats as we're sure to experience even more cyber-threats for the rest of the year
AusCERT has returned to the Gold Coast for another year, and ZDNet was there to bring you all the highlights.
The U.S. Sentencing Commission website has been hacked a second time. A code distributed by Anonymous "Operation Last Resort" turns ussc.gov into a game of Asteroids.
Amid a serious security flaw in the latest version of Java 7, where even the U.S. Department of Homeland Security has warned users to disable the plug-in, here's how you do it.
A look back at the hot topics, major discoveries, and technological breakthroughs of 2012: from privacy to surveillance, major product launches, successes and catastrophes.
ZDNet looks back at the year, on a month-by-month basis, at some of the most publicized hacks, leaks and data breaches of 2012.
Thanksgiving is over, and we're heading into December. It's time for a look back at all the blunders, catastrophes, epic fails and major screw-ups of 2012.
A tour of the best Android smartphones currently available on the market.
During the year, we have seen the destruction of SOPA and PIPA but the emergence of CISPA and similar laws around the world, a growing trend in hacks and scams, an explosion in malware, and states committing cyberwarfare on their friends and foes. Here's a run-down of what happened in 2012.