Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Content providers are stepping away from the Australian Federation Against Copyright Theft (AFACT)'s pursuit of ISPs over copyright infringement, and are open to iiNet's piracy mediator model, according to iiNet's chief regulatory officer Steve Dalby.
It's only a matter of time before most SMBs will experience a compromised IT infrastructure. To minimize the fallout from a data breach, SMBs should begin an IT risk assessment program.
They're a modern-day must. Anyone who's ever forgotten their credit card at home or worse, lost it, knows exactly how crucial that piece of plastic truly is. With rampant fraud and ID theft though, most cardholders are equally aware of the risks. But what if the account number on your card disappeared when not in use? ZDNet correspondent Sumi Das explores payment innovations from Dynamics, Square and Bling Nation.
At a Churchill Club event in Mountain View, Calif., executives from Silicon Valley discuss the delicate line companies walk between protecting privacy and offering better location-based services.