Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

Photo: Worm vs. worm

Photo: Worm vs. worm

Zobot and other worms and variants have hit networks since Sunday. A sketch shows which pests try to detect or undo rival pests, according to F-Secure.

published July 19, 2006 by

Comments

Photo: Real deal switches on video

Photo: Real deal switches on video

Jim Ryan, vice president of consumer data services at Cingular, (left) and Rob Glaser, CEO of RealNetworks, (right) talk up the new streaming video service that RealNetworks will offer over Cingular's new 3G mobile network during a keynote speech at the CTIA IT and Entertainment conference in San Francisco on Sept. 28, 2005.

published July 19, 2006 by

Comments

Security Bites: Macs face Wi-Fi hijack risks

A month-and-a-half ago, Apple Computer dismissed claims that MacBooks could be hijacked via Wi-Fi. This week, however, the Cupertino, Calif., company released security updates for a trio of flaws in Mac OS X that could be exploited to do just that. CNET News.com's Joris Evers and CNET.com's Robert Vamosi chime in.

published September 22, 2006 by

Comments

Microsoft's patch debacle

Microsoft's MS06-042 update for Internet Explorer caused browser crashes and introduced its own security flaw. A fix was delayed because of distribution issues. CNET's Joris Evers and Robert Vamosi discuss the problem in this week's Security Bites.

published August 25, 2006 by

Comments

Homeland security chief on privacy

Chertoff, secretary of the U.S. Department of Homeland Security, appears at the opening of the Joint Regional Intelligence Center in Norwalk, Calif., on Friday, Aug. 18, saying that his department is indeed concerned with privacy. The intelligence center joins federal, state and local law enforcement in one facility as part of a post-9/11 effort to improve law enforcement collaboration.

published August 21, 2006 by

Comments

Behind the scenes at the real-life "24"

CNET News.com's Joris Evers gets inside the first Joint Regional Intelligence Center, whose workforce is drawn from the FBI, Homeland Security and regional agencies. Our camera was allowed in for a visit from Michael Chertoff, secretary of the U.S. Department of Homeland Security.

published August 19, 2006 by

Comments

Windows worm watch is on

The worm alarm is being raised over a "critical" vulnerability in Windows, with even the U.S. Department of Homeland Security urging Windows users to patch up now. CNET's Joris Evers and Robert Vamosi discuss the matter in this week's Security Bites.

published August 11, 2006 by

Comments

E-passport flaws

Radio frequency identification tags in passports may make it possible to determine from a distance whether somebody is carrying a passport and even tell the nationality of a passport holder. Taken to an extreme, such identification could make it possible to detonate explosives only when someone from a particular country is nearby, Flexilis shows in this video. Researchers addressed e-passport concerns at the 2006 Black Hat security conference in Las Vegas.

published August 8, 2006 by

Comments

Password on a credit card

InCard Technologies has developed technology that can turn a credit card into a device that generates passwords for one-time use, for example for stronger authentication when banking online. CNET News.com's Joris Evers takes a look.

published August 1, 2006 by

Comments

Confidential data loss

Data theft is one of the biggest security headaches for companiestoday. Joe Fantuzzi of Workshare explains how all networks arevulnerable and the steps you can take to secure them.

published July 27, 2006 by

Comments

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories