Security

Let's face it. Software has holes. And hackers love to exploit them. New vulnerabilities appear almost daily. If you have software - we all do - you need to keep tabs on the latest vulnerabilities.

Featured Stories

Articles about Security

China holds back bill that worries US govt

China holds back bill that worries US govt

Counter-terrorism law requiring IT vendors to hand over information to the Chinese government has been put on hold, following concerns raised by Barack Obama. But it's unclear if it will proceed with the law.

published March 15, 2015 by

Comments

Telcos demand Commonwealth stump up for data retention

Telcos demand Commonwealth stump up for data retention

The CEOs of Telstra, Optus, Vodafone, iiNet, Macquarie Telecom, M2, and others have signed a letter demanding Australian Attorney-General George Brandis and Communications Minister Malcolm Turnbull detail how much the government is willing to pay for the mandatory data-retention scheme.

published March 15, 2015 by

Comments

Identity Theft Protection Policy

Tech Pro Research's Identity Theft Protection Policy will help you safeguard your employees and customers who entrust the organization with their confidential information. You can download the policy...

from TechProResearch »

Microsoft launches its security service

Windows Live OneCare provides a mini-IT department for those who want a managed service to provide virus protection, anti-spyware and firewalls. It is the first of many managed online security services to debut this year. Offerings from Symantec, McAfee and other established security vendors are due out as well.

published May 30, 2006 by

Comments

How to secure your data

Parts of the corporate network, such as disk drives and servers, can be at risk of intrusion without a proper data protection architecture. Ron Willis of Cipher Optics explains how companies are using this architecture to secure their networks.

published May 30, 2006 by

Comments

Reporter Roundtable: Lenovo and the China card

Is Lenovo a potential information security risk because of the Chinese government's part ownership in the PC maker? That's what an influential Congressman says, and he forced the U.S. State Department to back down over the issue. Join CNET News.com's Reporter Roundtable with Charles Cooper, Harry Fuller, Tom Krazit and Joris Evers for a behind-the-scenes discussion of what happens next.

published May 26, 2006 by

Comments

C.R.A.P. that won't go away

Digital Rights Management-- or what ZDNet Executive Editor David Berlind calls C.R.A.P. (Content Restriction Annulment Protection) -- has enabled companies like Apple to lock music downloaded through their service into their own devices. Berlind describes an effort to create a DRM standard so content can flow seamlessly between multiple devices.

published May 26, 2006 by

Comments

Symantec takes on Microsoft

Storage tech is the issue, but CEO Thompson says Symantec isn't afraid of Microsoft in security either. Also, spam fighter surrenders, and a tool to make Web search safe arrives. Join Joris Evers and Robert Vamosi for this week's Security Bites.

published May 19, 2006 by

Comments

Symantec vs. Microsoft

John Thompson, Symantec CEO, tells CNET News.com's Joris Evers that his company is much more focused on security than Microsoft. The interview took place after Thompson's keynote at Gartner Symposium ITxpo 2006 in San Francisco on May 17.

published May 18, 2006 by

Comments

What security will cost you

After his keynote at Gartner Symposium ITxpo 2006 in San Francisco on May 17, Thompson spoke with CNET News.com reporter Joris Evers about the price of security software and Microsoft's entry into the security competition.

published May 17, 2006 by

Comments

DRM this and DRM that

At the Gartner Symposium ITxpo in San Francisco on May 16, Motorola CEO Edward Zander talks to CNET about the many and varied digital rights management standards. How does he cope?

published May 16, 2006 by

Comments

Microsoft warns about Flash flaw

Microsoft sent out a "critical" alert for a flaw in Adobe's Macromedia Flash player, a first. Also, Apple repairs dozens of flaws, Symantec battles Microsoft, FBI has no time for ID theft, and MySpace hijacked for fame and gain.

published May 12, 2006 by

Comments

AJAX & security

AJAX is a new Web technology being used in sites like Google Maps and MySpace. Like every new technology, it has security risks. Brian Chess of Fortify Software urges developers to be mindful of these threats.

published May 8, 2006 by

Comments

Open source security

Open-source software developers often rely on the "many eyeballs" theory to ensure security. Brian Chess of Fortify Software says this process is ineffective, and urges users to hold developers accountable.

published May 8, 2006 by

Comments

The best of ZDNet, delivered

You have been successfully signed up. To sign up for more newsletters or to manage your account, visit the Newsletter Subscription Center.
Subscription failed.

Top Stories