Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.
Articles about Security
Here's the holiday story that only seems to be going from bad to worse.
And Joaquin Almunia, who has been embroiled in a three-year saga with Google, is not happy about it one bit.
Do social networks really sap worker productivity? Is your staff following corporate IT policies? A survey of 1,110 small-business employees confirms your suspicions.
The new Australian government has had a draft discussion paper prepared on the controversial Section 313 powers granted to government agencies to force ISPs to block websites, but it has not acted on it since the election.
The phone and cellular giant, which has been forced under a court order, leaked by Edward Snowden, to hand all business records to the NSA, plans to dish out more details on government data requests.
State-sponsored surveillance and repression should not be your concern. Social networks, providers and employers you trust to safeguard your data and livelihood is what worries me most.
If you're going to stick with XP when security updates from Microsoft are gone, your security software will become more crucial than ever. Which are best?
Customer name, credit or debit card number, and the card’s expiration date and CVV (the three-digit security code) were breached, the retailer said.
New Android malware captures all the victim's SMS and shoots them off to the attacker's email accounts.
The General Assembly of the United Nations has unanimously passed a resolution that affirms the same rights in the online and offline realms.
Two of the 40 recommendations — which the White House can still ignore — hints that private companies should be allowed to report data access figures.
With just one person to watch over about 100 workstations and servers, Central Bank & Trust sought a security option that could be used centrally across its five locations.
The Target security breach is initially thought to have lasted between Thanksgiving through Friday, December 6 -- or possibly even up to December 15.
The White House on Wednesday will release an outside report into the U.S.' mass spying efforts with recommendations for change. But they will be just that: recommendations.
Eldo Kim, Harvard student, wanted to get out of a final exam so he sent in a bomb threat using Tor to disguise his location and identity. Tor's not magic and the FBI caught him anyway.