Even an anti-piracy group opposes SOPA, the proposed US anti-piracy legislation
Users of the Tor anonymous project can give back to the community by bridging to Amazon's cloud
Movie sequels are usually futile, and the ClimateGate 2 leaked emails are equally pointless, says Peter Judge
More hacked emails from the UEA's Climatic Research Unit could destabilise UN climate summit
Local authorities still flagrantly disregard data protection laws in over 1,000 cases of negligent data loss
Pentagon sanctions military strikes as a suitable response to cyber-attacks targeting US battle zones
It's easy to overlook the security risks of VOIP, warns Jonathan Greenwood of Snom, but the consequences can be severe
Syrian government sites hosted in the US, Canada and Germany may break internatiobnal sanctions
Banks in the UK are simulating the combined effects of a cyber attack and Olympic gridlock today
A Congressional probe aims to determine Chinese manufacturers' 'motives' in selling into the US market
Access to one of the biggest file-sharing websites was disrupted last week after a IWF blacklist problem
Websense sees social media identity theft as a growing threat for 2012. Eric Doyle argues that it is a present…
Amelia Andersdotter will be the youngest ever MEP, more than two years after her election
ICO would have fined Southwark for losing records lost in a skip, if the case wasn't two years old
European Commission vice president Neelie Kroes has argued that current copyright system is not working
Initiative aims to encourage workers to use technology to lighten their travel load
Fake e-commerce sites defrauded shoppers of millions of pounds ahead of Christmas buying season
Stolen Mackbooks recovered using a mixture of luck, technology and a little quick thinking
Hackers destroyed a pump at a US water company after hacking into the network of a SCADA vendor
Because firewall management is not automated, admins are cheating on audits, a study says
Google, Microsoft and others have signed up to the CSA's Star list of security-compliant cloud providers
A court ruling ordering Twitter to hand over an Icelandic MP's private data has broader repercussions
Tokenless authentication patents to help Cryptocard grow in SMB market
Cyber-crime data is lost because victims refuse to report breaches, Metropolitan Police told Commons
The service automatically discovers systems and devices on the network and scans for exposures to risk
Microsoft is promising users fewer annoying restarts after revamping its update policy for Windows 8
Britain has had two years of legal debate about the online copyright isssue, says Peter Judge. Why has the US…
London Olympics, US presidential elections, and Mayan calendar will lead to broad attacks by criminals