Firm's shadow IT buster 'Content Security Service' will aim to secure work content even with BYOD workers
The cost to respond to and remediate one security breach resulting from failed malware detection technology is approximately $62,000 per…
Former gamers speak of carrying out thousands of killings through the CIA's Predator drone programme
User Data Compromised In Raptr Gamer Social Network Hack
Adobe's latest flaw has allowed hackers to take control of thousands of users' computers
Google is supplementing its existing bug bounty programmes with a scheme that will pay top researchers to investigate key services
Talk about a ruined Valentines Day - hacked sex toys can be accessed to post images and even video
The Swedish Pirate Bay website returns after it was taken offline during a police raid
Seen Die Hard 4.0? That’s what’s coming soon if you don’t shape up, Kaspersky warns world leaders
Microsoft confirms free Windows 10 upgrade is not available for large businesses, and it will be updated differently
German carmaker patches flaw that could allow hackers to gain access to BMW, Mini, and Rolls Royce vehicles
Our round-up of the expert views concerning keeping your data safe online
Arbor's 10th Annual Worldwide Infrastructure Security Report points to the growing attack bandwidth and application layer attacks
Details remain sketchy - has the hacker turned security consultant?
Funding to transform former Nuclear Lab into centre for renewable energy and cyber security skills
The scheme aims to develop the UK into Europe's hub for cyber security startups
A new type of malware has been blamed for the bitcoin theft
The FBI has warned businesses that work with foreign suppliers to be vigilant against email wire transfer scams.
Amazon challenges Microsoft and Google with the launch of an email service aimed at businesses
Protectionism or national security? China demands foreign firms hand over source code for inspection
Johnathan Nightingale, VP Firefox at Mozilla, explains how you can safeguard your privacy on computers and mobile devices
Colt's John Hayday discusses security needs in today's data centre
The end of traditional biometric and password security? US Military signs deal for new ID verification system
Critical vulnerability found in Linux systems gives attackers control without system credentials
Smartphone users need to be aware of what data their mobile apps have access to, say Silent Circle and Blackphone
"Hackers gonna hack hack hack hack hack", it seems, as Taylor Swift's Twitter account not able to “shake it off”…
With today being Data Privacy Day, the identity and data protection specialist at digital security firm Gemalto explains how you…
How much do you trust your employees with the passwords to important documents?
Facebook, Instagram and Tinder were all affected by the outage, which left millions across the world unable to access the…
Kaspersky Labs' David Emm tells TechWeekEurope that the security threat to mobile payments is still in its infancy - but…