Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

VoIP security: The real risks

Sponsored: Like traditional data networks, voice networks carry their share of security risks. VOIP Watch's Andy Abramson explains "SPIT" (Spam over Internet Telephony) as well as the security concerns that come with VoIP and how to protect yourself.The content for this video was sponsored and provided by VOIP Watch.

published July 11, 2006 by


Fixed patch, new flaws

A fixed patch and new flaws in Microsoft software, a security update from Apple Computer and a promise of safer browsing with IE 7 or GreenBorder. Join Joris Evers and Robert Vamosi for this week's Security Bites.

published June 29, 2006 by


Microsoft launches its security service

Windows Live OneCare provides a mini-IT department for those who want a managed service to provide virus protection, anti-spyware and firewalls. It is the first of many managed online security services to debut this year. Offerings from Symantec, McAfee and other established security vendors are due out as well.

published May 30, 2006 by


How to secure your data

Parts of the corporate network, such as disk drives and servers, can be at risk of intrusion without a proper data protection architecture. Ron Willis of Cipher Optics explains how companies are using this architecture to secure their networks.

published May 30, 2006 by


The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories