Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Content providers are stepping away from the Australian Federation Against Copyright Theft (AFACT)'s pursuit of ISPs over copyright infringement, and are open to iiNet's piracy mediator model, according to iiNet's chief regulatory officer Steve Dalby.
BYOD means freedom of device choice for business users, but it can also unleash an avalanche of security concerns. This ebook will help you sort out the risks and take the right steps to contain...
They're a modern-day must. Anyone who's ever forgotten their credit card at home or worse, lost it, knows exactly how crucial that piece of plastic truly is. With rampant fraud and ID theft though, most cardholders are equally aware of the risks. But what if the account number on your card disappeared when not in use? ZDNet correspondent Sumi Das explores payment innovations from Dynamics, Square and Bling Nation.
At a Churchill Club event in Mountain View, Calif., executives from Silicon Valley discuss the delicate line companies walk between protecting privacy and offering better location-based services.