Governments' energy policies and surveillance activities will unintentionally shape our data centres, says Peter Judge
European telcos could ease customers' fear of US-based surveillance, if they can build the right services, says Birger Steen
Hackers claim they wanted to show up Snapchat security weakness
Hackers leave anti-NSA spying messages across Microsoft-run accounts
Apple denies it created a backdoor to allow the NSA to spy on the iPhone
Attackers will increasingly target devices that make up the Internet of things during 2014, experts warn
Cash machines running Windows XP attacked, researchers at the Chaos Communication Congress say
The US' National Security Agency has an internal list of security vulnerabilities that it uses to place surveillance code into…
Dell Secureworks has estimated that the Cryptolocker botnet infected at least 200,000 systems in its first 100 days and is…
US retailer Target has disclosed that the credit card PIN numbers taken in the breach were encrypted
Spy agency said to have diverted targets' PC orders to "load stations"
Access to BBC ftp server said to have been sold on underground forums
Gmail users will no longer have to click to display images in emails, due to a new security feature
Codebreaker and computer pioneer Alan Turing is granted a pardon 61 years after he died
Fear of another Al-Qaeda attack kept the intelligence agencies collecting ever increasing amounts of data
RSA denies the NSA paid it to ship a deliberately weakened encryption tool to customers
AT&T to publish first transparency report next year but says US government should be more open
Check your Christmas credit card bills, don't be scared of security breaches, says Sean Michael Kerner
The cyber-crime group behind the ZeroAccess botnet appears to have given up on resuming control of its 1.3 million compromised…
Verizon to publish list of law enforcement requests twice a year, but says its hands are tied on security demands
for Barry Shteiman, security is all about people sharing information to keep each other secure
A new study suggests that all software companies should buy critical code flaws to close cyber-crime vulnerabilities
Have a clear privacy policy or risk alienating users, warns the data protection watchdog
Half of Norman Shark technology has already been integrated into Blue Coat products
As many as 40 million credit cards potentially compromised as Target brings in law enforcement
The US government will ignore much that Obama's advisors ask for, says Wayne Rash, but some things will change
Washington Post gets hacked again and China is the chief suspect
Virtual currency loses almost a third of its value in just one day
Schneier isn't leaving because of alleged BT connections with GCHQ spying, as "conspiracy theories" are shrugged off by the telecoms…