Mobile device users are lax about installing security software or using strong passcodes to protect data on their mobile devices
Microsoft's workaround prevents HTTP requests that can occupy all CPU cycles on a Web server
Most Facebook scams in 2011 tricked users into going to affiliate marketing sites to fill out surveys, Commtouch said
The Koobface botnet now monitors and drives Internet traffic through affiliate sites to increase clickthrough revenues
Apple iPhone 4 users who are chaffing to get their hands on Siri can now do so, thanks to the…
Domain resellers and owners are boycotting registrar GoDaddy over its support for the controversial Stop Online Piracy Act
Mozilla has fixed six vulnerabilities in its Firefox 9 web browser, two of which concern issues with HTML5
Security researchers develop app which bypasses Android security permissions
Twitter has made the source code of Whisper Systems'TextSecure software available on its GitHub.
The Chinese government may have breached the US Chamber of Commerce and stolen Asian policy information
Irish data protection commissioner tells Facebook to give users greater control of data
Iran claims a known GPS hack brought down a US Sentinel spy plane, but US military says it was just…
Juniper Networks has hit out at Palo Alto Networks, alleging it willfully infringed upon six Juniper firewall patents
Anonymous is playing Santa with a Robin Hood twist by hacking into banks to buy Christmas gifts for the "needy"
Users unable to access church Website for four months due to O2's 18-plus rating
The theme of the pre-trial testimony of WikiLeaks source Bradley Manning is that US military security was lax
A committee of MPs have said social networks should not be closed or blocked during civil disorder
ENISA report calls on European member states to improve cyber-security measures
New devices and first-time users provide the ideal mix for Christmas exploits so take a secure grip from the start,…
Two exploit kits begin attacks on systems unpatched against new cross-platform Java flaw
The 2011 predictions cover green power, mind-reading machines, desirable junk mail, DNA passwords, and digital profusion
Microsoft has revealed more technical information on its upcoming Picture Password feature, arguing it is as secure as conventional techniques
South Korean authorities have warned of the likelihood of North Korean cyber-attacks in the wake of Kim Jong-il's death.
Adobe has finally delivered a fix for the critical vulnerability in Adobe Reader and Acrobat
BlackBerry mobiles allow kids to access porn sites but RIM promises to block illegal content in a matter of days
When Carrier IQ's mobile device monitoring software first came to everyone's attention after a security researcher demonstrated how it logged…
Google has raised the profile of Google+ Hangouts, which enables video chat for up to 10 users
New tools such as code dictionaries and rainbow tables are helping crooks to crack systems, according to Imperva
Researchers from Cisco have found that younger professionals are easy-going about breaking security policies at work
Microsoft is to begin upgrading IE users automatically, unless the user specifically opts out