Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

​NSW iVote vulnerability 'overstated'

​NSW iVote vulnerability 'overstated'

Researchers' claims that the New South Wales online iVote system was vulnerable to a FREAK attack have been overstated, according to the state's Electoral Commission, which has questioned the researchers' motives.

published March 25, 2015 by

Comments

Identity Theft Protection Policy

Tech Pro Research's Identity Theft Protection Policy will help you safeguard your employees and customers who entrust the organization with their confidential information. You can download the policy...

from TechProResearch »

Industrial Light and Magic's brilliant pirate master

ILM's visual effects supervisor oversees all the gruesome characters and supernatural transformations you see in the Pirates of the Caribbean: Dead Man's Chest. Those effects have earned a 2007 Oscar nomination. Meanwhile, John Knoll is facing an April deadline for scenes to be in the next installment: Pirates of the Caribbean: At Worlds End. CNET's Veronica Belmont got to talk with Knoll in his office the day after the nomination was announced.

published January 25, 2007 by

Comments

Compliance & data security

Sponsored: To comply with federal regulations such as the Sarbanes-Oxley Act, enterprises need to make sure their financial data is reliable, and thus secure. Paul Needham, Oracle's director of product management for database security, says organizations should focus on five key areas to improve data security.The content for this video was sponsored and provided by Oracle.

published November 22, 2006 by

Comments

Identity Management 101

With the growth of e-business, many organizations are faced with thechallenge of managing secure access to data and applications across a widerange of computing systems. Jasuja, vice president of product managementat Oracle, discusses the building blocks of an identity management system andthe keys to choosing the right solution.The content for this video was sponsored and provided by Oracle.

published November 22, 2006 by

Comments

Identity Management & Sarbanes Oxley

Sponsored: Identity management not only enhances security, but it can improve compliance with the Sarbanes-Oxley Act. Rohit Gupta, the director of Oracle'sID management & security products, explains how this is achieved.The content for this video was sponsored and provided by Oracle.

published November 22, 2006 by

Comments

Security Bites: Get ready for Microsoft Vista

Microsoft has finally wrapped up work on Windows Vista, the first major Windows release in five years. Vista promises to be a safer operating system than Windows XP. On this week's Security Bites podcast, CNET News.com's Joris Evers and CNET.com's Robert Vamosi give a preview.

published November 10, 2006 by

Comments

Security Bites: Firefox 2 beats IE 7

Unless you've been living under a rock, you know that Mozilla unleashed Firefox 2 this week. Although the new browser is not a giant leap from version 1.5, it does beat Microsoft's Internet Explorer 7 in several aspects, including security, say CNET News.com's Joris Evers and CNET.com's Robert Vamosi on this week's Security Bites.

published October 27, 2006 by

Comments

Hackers vs. Firefox

From the ToorCon hacker conference in San Diego: Jesse Ruderman, a Mozilla security staffer, urges Mischa Spiegelmock and Andrew Wbeelsoi not to use possible flaws in the Web browser to build botnets. (Video courtesy of Media Archives.)

published October 2, 2006 by

Comments

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories