Facebook, and Twitter are a source of information and rioters have other networks, say experts
Google adds forward secure HTTPS encryption for its key Web services to thwart retrospective decryption
ArcMail for Instant Messaging is designed to bring compliance and data discovery to IM platforms
The DHS claims that cyber attackers did not gain control of SCADA systems at a water utility company
Even an anti-piracy group opposes SOPA, the proposed US anti-piracy legislation
Users of the Tor anonymous project can give back to the community by bridging to Amazon's cloud
Movie sequels are usually futile, and the ClimateGate 2 leaked emails are equally pointless, says Peter Judge
More hacked emails from the UEA's Climatic Research Unit could destabilise UN climate summit
Local authorities still flagrantly disregard data protection laws in over 1,000 cases of negligent data loss
Pentagon sanctions military strikes as a suitable response to cyber-attacks targeting US battle zones
It's easy to overlook the security risks of VOIP, warns Jonathan Greenwood of Snom, but the consequences can be severe
Syrian government sites hosted in the US, Canada and Germany may break internatiobnal sanctions
Banks in the UK are simulating the combined effects of a cyber attack and Olympic gridlock today
A Congressional probe aims to determine Chinese manufacturers' 'motives' in selling into the US market
Access to one of the biggest file-sharing websites was disrupted last week after a IWF blacklist problem
Websense sees social media identity theft as a growing threat for 2012. Eric Doyle argues that it is a present…
Amelia Andersdotter will be the youngest ever MEP, more than two years after her election
ICO would have fined Southwark for losing records lost in a skip, if the case wasn't two years old
European Commission vice president Neelie Kroes has argued that current copyright system is not working
Initiative aims to encourage workers to use technology to lighten their travel load
Fake e-commerce sites defrauded shoppers of millions of pounds ahead of Christmas buying season
Stolen Mackbooks recovered using a mixture of luck, technology and a little quick thinking
Hackers destroyed a pump at a US water company after hacking into the network of a SCADA vendor
Because firewall management is not automated, admins are cheating on audits, a study says
Google, Microsoft and others have signed up to the CSA's Star list of security-compliant cloud providers
A court ruling ordering Twitter to hand over an Icelandic MP's private data has broader repercussions
Tokenless authentication patents to help Cryptocard grow in SMB market
Cyber-crime data is lost because victims refuse to report breaches, Metropolitan Police told Commons