Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
As the world's most famous hacker conference, DEF CON celebrated its 21st year with record attendance, a no-Feds policy, Prism and Snowden themes, an official documentary and the usual subversive shenanigans.
Black Hat USA 2013 vendor area included companies such as Veracode, Booz Allen Hamilton and Microsoft, with creative schwag such as Botnets for Breakfast (cereal) and 'hacker' playing cards.
Leading security conference Black Hat 2013 boasts over 100 talks that include hacking nuclear facilities, rooting SIM cards, OPSEC failures of spies, a keynote from the NSA and more.
During his packed Black Hat USA keynote NSA Director Keith Alexander assured the crowd that the NSA's surveillance programs are lawful interception; attendees did not hesitate to shout "Bullshit."
Hold onto your tin hats as we're sure to experience even more cyber-threats for the rest of the year
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
AusCERT has returned to the Gold Coast for another year, and ZDNet was there to bring you all the highlights.
The U.S. Sentencing Commission website has been hacked a second time. A code distributed by Anonymous "Operation Last Resort" turns ussc.gov into a game of Asteroids.
Amid a serious security flaw in the latest version of Java 7, where even the U.S. Department of Homeland Security has warned users to disable the plug-in, here's how you do it.
A look back at the hot topics, major discoveries, and technological breakthroughs of 2012: from privacy to surveillance, major product launches, successes and catastrophes.
ZDNet looks back at the year, on a month-by-month basis, at some of the most publicized hacks, leaks and data breaches of 2012.
Thanksgiving is over, and we're heading into December. It's time for a look back at all the blunders, catastrophes, epic fails and major screw-ups of 2012.
A tour of the best Android smartphones currently available on the market.
A look back at some of the successes and victories, the bad times and controversies, and the downright ugly failures by Twitter and by its users, during 2012.
Controversial Global hacking conference Hack In The Box just celebrated its ten-year mark in Kuala Lumpur, Malaysia. The event attracted hackers from all over the world and company participants that included Google, Mozilla, Microsoft, Amazon, sponsor 'friends' such as Megaupload, and many more.