They might not get on usually, but Google and Microsoft have joined forces to fight the US government over transparency…
Actors affiliated with Anonymous claim they have a load of the Syrian Electronic Army's data, but the pro-Assad group tells…
Three design executives are arrested over allegations they were going to use HTC information to set up a new company
The defect density in the Python programming language now surpasses that of other open source and proprietary projects, according to…
The Syrians hit the New York Times via Australia, but the newspaper had only itself to blame, says Sean Michael…
Speculation is rife over a boom in anonymous Tor usage
HP unveils its Fortify Source Code Analyzer 4.0 for faster and more accurate software code analysis
Two programmers reverse-engineer the client written in obfuscated Python, enabling new attack vectors
The website of the New York Times has been taken offline in the latest Syrian Electronic Army attack
The American government has warned its staff about the prevalence of malware on the Android OS
Risk consultant Peter Humphrey has admitted using “illegal means” to obtain information
Report throws up no surprises for which country is the hungriest for user data - America, followed by India and…
Arrests follow probe into scheme that saw 700 UK citizens' identities stolen
Facebook has agreed to make changes to its Statement of Rights and Responsibilities as part of a $20m class-action settlement…
Experts spot major jump in DDoS activity in China, as DNS provider takes a battering
Anxiety about being without a mobile phone connection leads people to check their messages at the beach and in bed…
Following attacks on Jon Snow's blog, Outbrain and The Washington Post, the SEA allegedly redirected traffic from social media service…
Apple and Facebook had to decide whether hackers had disclosed useful data, or violated their terms, says Sean Michael Kerner
Claims from a German publication that the NSA could easily access Windows 8 machines are rebuffed
Mental health and residential needs data leaked by local authority
MoleRats attackers using Poison Ivy as they attempt to infiltrate global governments
Attacks on missile warning services, sophisticated malware campaigns and the Syrian Electronic Army make for a chaotic cyber conflict, TechWeek…
NSA wasn't honest about a snooping operation that scooped up rafts of US citizens' Internet communications, documents released by the…
He highlighted a flaw on Facebook by posting on Zuckerberg's page but didn't get paid - now the community has…
The illegal use of mobile phones within prisons is back in the news with the arrival of tiny keyfob mobile…
Could French activist Laurent Chemla's CALIOP fill the gap left by Lavabit and Silent Circle?
The open source law website Groklaw closed over privacy fears. Sean Michael Kerner hopes it comes back
McAfee issues stark warning about the growing levels of malware and ransomware infecting mobiles
Tumblr hasn't been hacked but a technical problem has caused random posts to appear on users' blogs
F-Secure has new products on the way. CEO Christian Fredrikson says they will cooler and more attractive than Dropbox