The service automatically discovers systems and devices on the network and scans for exposures to risk
Microsoft is promising users fewer annoying restarts after revamping its update policy for Windows 8
Britain has had two years of legal debate about the online copyright isssue, says Peter Judge. Why has the US…
London Olympics, US presidential elections, and Mayan calendar will lead to broad attacks by criminals
Baroness Neville-Jones is the CSC's first patron and four new sponsors join the group
The ICO has slammed a Wolverhampton nursery school which lost records on a tape
The US House Of Representatives' Stop Online Piracy Act would break e-commerce and still fail to prevent piracy, says Wayne…
The South Korean government's "Block 25" plan could also block legimiate traffic and suppress dissidents
Despite breaches, half of the UK's organisations are risking breaches from laptops and USB sticks
Facebook said it has identified the people who used a cross-site scripting vulnerability to spam users
Kaspersky revealed that elements of Duqu have been around since 2007, and Iran knew but didn't tell
Opting out of Google's Wi-Fi location system for privacy is not easy. Wayne Rash says it should have been an…
Symantec agrees to sell its stake in Huawei Symantec Technologies to its partner for $530 million
IMS.cloud blocks messages that are malicious or violate corporate policy and the user is notified
Trojan may be planted by the TDSS rootkit, the hard-to-remove malware behind numerous attacks
Another gaming service has suffered a damaging hacking attack, but this time it is Valve's Steam not Sony
The Information Commissioner has fined a man for selling the personal details of online bingo players
Cyber-criminals are using malware and man-in-the-middle tactics to transfer cash from bank accounts, even with two-factor authentication in place
Users have complained of violent and sexual images appearing on their profiles
Web standards maker W3C proposes a standard for "do not track" features in browsers
Tools such as Google Code Search can provide hackers with a wealth of information hidden in open source code, writes…
Iran confirmed its government systems were attacked by the Duqu worm, but says all is under control
Cloud computing did not exist when data protection regulations came in. John Roberts of Redstone explains how to keep within…
IBM is aiming to help IT departments support more personal mobile devices while protecting data
EDF has been found guilty of hacking into the computers of Greenpeace, and has been issued a hefty bill
Facebook will agree to 20 years of privacy audits to end privacy investigation
Research shows that more Brits than ever use online banking with two of three using it at least once a…
Administrators must consider the potential vulnerabilities posed by the printer if they are to secure their networks