The US Senate failed to reach a compromise in time to save key Patriot Act surveillance powers
The judge argued Silk Road was run as a profitable criminal enterprise that expanded the market for dangerous drugs
Iron Mountain's Phil Greenwood explains how protecting people is vital to protecting vulnerable data within the public sector
North Korea spends up to 20 percent of its military budget honing its cyber-attack capabilities
Government confirms sweeping new powers for the security services in fresh blow to privacy campaigners
How UserLock enables the School of Engineering & Digital Arts, University of Kent, to provide secure 24-hour access to computer…
Ukranian ransomware demands up to $1,500 to unlock victims' devices
British measures to block porn on computers and mobile devices by default faces European challenge
iPhones will restart following SMS containing Arabic text, user reports say
Android developers will not longer be able to self certify the age rating of their apps as part of an…
Fact or fiction? Can your smartphone identify you just by the way you type on the keyboard?
Government opts not to renew extended support agreement for Windows XP, as migration continues
Arxan Technology director Jonathan Carter explains how you can protect against IoT threats
Wherever you are, be safer from hackers with these top tips from Sophos
Researchers find more than 30 'Minecraft cheat' apps that attempt to trick users into subscribing to premium rate SMS services
A new Cambridge study has found that user data is routinely retrievable from second-hand Android devices that have been wiped…
Adult FriendFinder has called in police after being informed of the leak of millions of users' personal details, including those…
New scam uses Windows Live ID as bait to catch personal information stored in user profiles on services like Xbox…
Porkie pie time...study finds consumers deliberately provide wrong information when businesses ask for personal details
Sophos’ John Shaw tells TechWeekEurope why government agencies need to sharpen up their defences
Not again! Another legacy encryption flaw could explain how the NSA and co cracked encrypted communications
It's good to talk - IBM initiative aims to help companies share their cyber security experiences
Child monitoring firm denies massive data leak but admits that it was approached by blackmailers
Akamai says attackers are changing tactics with DDoS now lasting longer but using less bandwidth
Newly uncovered legacy vulnerability could put millions of routers at risk
Employee training and accountability are two of the most important tools in decreasing internal risk, says Zoltán Györkő, CEO at…
Telstra executives were only told about Pacnet security breach after their purchase of the firm was complete
Retailers fare even worse, taking up to six months to identify threats, Arbor Networks survey finds
The ErsatzPasswords system lets you know when an attempted hack takes place - and tells you what the attacker was…
Hackers launching a increasing mix of old and new style attacks, Trend Micro survey finds