Fake nuclear bomb story posted on Snow's blog, as Channel 4 blogs remain down
Tim Berners-Lee disappointed by Google's response to criticism of Chrome's stored passwords
Twitter dumps SMS form of two-factor for significantly more secure method
Deniss Calovskis claims he is innocent, will appeal the decision with European Court of Human Rights
Zimbabweans knocked offline and see data wiped because of slew of cyber attacks last week during the elections, TechWeekEurope learns
Malware used to identify Tor users contacted an IP address owned by US government agency, researchers claim
Popular but loss-making security firm hopes to move on with hefty investment
A small, Linux-powered device unveiled at DEF CON allows hackers to take over devices' Wi-Fi connections and manipulate data flows
If hacking toilets and a talking electronic rabbit doesn't get kids excited about IT security, then nothing will, says Tom…
Windows 8.1 isn't perfect, but the enterprise version adds features IT has been wanting, says Wayne Rash
Lloyds Banking Group gets in trouble for sending faxes containing customer data to the wrong people
Evidence suggests hackers employed by the FBI managed to track some Tor users
Criminals, or possible vigilantes, are delivering illegal images and malicious software in one go
Security weaknesses in industrial control systems could allow hackers to create cataclysmic failures in infrastructure, according to researchers at the…
CreepyDOL, a £40 device built from easily available parts, demonstrates how easy it is to track and gather information on…
The country’s Foreign Minister says the 67-year prison term facing hacker Deniss Calovskis is too severe
The FBI has reportedly expanded its use of hacking techniques, including the use of eavesdropping tools on smartphones and laptops,…
Wikimedia Foundation says it appears to have been “specifically targeted by XKeyscore” NSA surveillance tool
Popular websites stop their services for a day to highlight the possible effects of a new anti-piracy law
Russian mobile malware factories working with thousands of affiliates to exploit Android users
Trustwave's researchers have built a tool designed to help improve security by mimicking highly targeted attacks
After two months in legal limbo, the whistleblower finally leaves the Sheremetyevo airport in Moscow
US made 902 of 1,157 requests in the first half of this year
"Jekyll" exploit can introduce malicious functionality after Apple checks, whilst bespoke chargers can install malware on iPhones
Alexander fends off attacks from BlackHat audience member
A study has found that the vast majority of mobile apps on Android and iOS leak private information
A slide leaked by Snowden reads: "Show me all the VPN startups in country X, and give me the data…