VUPEN will tell its customers, not Microsoft, about Windows 8 and IE10 vulnerabilities
Flaws in the iOS kernel, WebKit and Passbook addressed
What happens when the tech industry gets into the movies? Find out in our quiz!
They are over-prescriptive, confusing and unrealistic - just a few of the committee's problems with EC proposals
Cyber war is coming and governments are going to flex their muscles in the coming months, says Mikko Hypponen
Megaupload is reborn as Mega, will use encryption and won’t be responsible for hosted files
A single country-wide blacklist will block content deemed “harmful to children”
Malware pushers start to put claims Windows 8 is Microsoft's most secure OS to the test
Home secretary bats away most questions on the Communications Data Bill but has a few wobbles in the face of…
Acquisition builds on Art Coviello's promise to deliver Big Data-led strategy
PCeU and SOCA collaborating on phishing investigation
Supply chain weaknesses cause trouble for Experian
Hackers have stolen sensitive data on 3.6 million taxpayers from the US state of South Carolina, in the latest breach…
Yahoo plans to shun DNT requests from Microsoft's IE10
Fine is on top of £81,000 in extra licence purchases
Anonymous pledges to release confidential files on Guy Fawkes Night
Hackers say they are fighting the 'devil's work'
A flaw could allow passengers to avoid security checks
Forty years at the cutting edge of log management, has left Assuria's Nick Connor with an abiding love of the…
Cloud computing is being sold widely - but are there still questions to answer on the technolotgy questions? Peter Judge…
After “turning its back” on WikiLeaks, hackers plan to launch their own disclosure platform
Hackers ask police and armed forces to participate in Operation Jubilee
Council gets massive fine after emails are sent to the wrong person,
EMC has produced a strong set of financial results despite customer worries over economic growth
Book and Nook seller says it was hoodwinked by a sophisticated criminal operation
Spy agency announces another scheme to find the cyber security stars of the future
In a bid to settle espionage concerns, Huawei offers to open its source code and equipment for inspection down under
Ovum has added its voice to previous warnings about the possible security risks posed by unmanaged BYOD initiatives
Recovered spammers' funds going to fighting their kind