Kaspersky Lab says it is increasingly difficult to tell fake antivirus products from real antivirus software
the NetWars challenge will put the UK's best cyber security professionals go head to head
UK firms must learn to destroy confidential data when IT equipment reaches the end of its working life
Firmware print job redirection hack publicly demonstrated by a Columbia University team disputed by HP
UN Development Programme says no sensitive information was lost as Teampoison published its emails
Facebook has settled Federal Trade Commission charges of deceptive behaviour over privacy settings
Security fears over SSL prompt Wikileaks to delay the launch of its online submission system
Cloud services could lose, in an Olympian contest over privacy between US patriots and EU human rights defenders, says Eric…
RIM's management software will handle Androids and apple iPhones, as well as BlackBerrys
The expanded Samate Reference Dataset from NIST helps developers squeeze new bugs out of their code
Some council staff don't know the difference between internal and external email, the ICO has found
Twitter's acquisition of Whisper looks like a talent grab targeting Moxie Marlinspike and Stuart Anderson
The MoD has admitted to mislaying IT equipment including more than 180 laptops
Users can cause a lot of damage when given admin rights. It is time to stop the rot, says Paul…
BCS says the. government strategy is a good overall vision, but lacks emphasis in key areas
An EC Directive will ban information harvesting on social networking sites for targeted advertising
The Information Commissioner's Office has set up a blog to allow discussion of data protection issues
As the Patriot Act drowns Safe Habor concepts, European cloud services find a marketing angle
Companies throughout Europe still struggle to keep up with the growing BYOD trend
The government has published plans to prevent cyber attacks and crime while protecting growth
Talks over an official policy on "fraudulent" Website suspensions have stalled
In the last two years, UK employees have lost more than 17,000 staff and customer records on USB sticks
An email pretending to offer $50 of credit on the iTunes Store could take over a user's system
Facebook, and Twitter are a source of information and rioters have other networks, say experts
Google adds forward secure HTTPS encryption for its key Web services to thwart retrospective decryption
ArcMail for Instant Messaging is designed to bring compliance and data discovery to IM platforms
The DHS claims that cyber attackers did not gain control of SCADA systems at a water utility company