Google's dispute with China shows no sign of diminishing, after the search engine giant suggested that the issue should be…
Three men allegedly responsible for the virulent Mariposa botnet have been arrested by Spanish investigators
Researchers have uncovered evidence that the botnet behind the infamous attack on Google in 2009 was active months before the…
Microsoft has issued an official blog post detailing its engineers’ thinking process behind the build of Internet Explorer 8, the…
At the RSA Conference, White House Cyber-Security Coordinator Howard Schmidt announced that an unclassified version of the Obama administration's “Comprehensive…
Security specialist Credant has warned users to turn off their laptop's Wi-Fi signals, as thieves can easily locate the devices…
Microsoft has issued a security advisory after warning of a security hole caused by an unpatched zero-day flaw on older…
American troops can now use social networking sites to help them stay in touch with friends and family whilst serving…
Trusteer's methods of tackling malware have seen it clash with other established security specialists. The company's CEO Mickey Boodaei answers…
The UN's Intergovernmental Panel on Climate Change (IPCC) has said an independent panel of scientists would be appointed to review…
RSA Conference 2010 is kicking off on 1 March in San Francisco, bringing with it a focus on the latest…
Obscene hacked tweets, apparently from MPs Ed Miliband and Harriet Harman, should be a warning for all of us to…
From executives being charged for privacy violations, to complaints from Microsoft-supported entities in Brussels and Google's joust with China, Google…
The furore over the Webcam spying lawsuit in a US school has deepened, after the assistant principal lashed out at…
Microsoft has won a legal battle that has resulted in a temporary restraining order against one of the worst sources…
Netgear’s ProSecure UTM 5 is a small business security appliance with big business features
Redstone Mortgages had been sending customer details by email since 2005 with no password or encryption
P2P Cyber Protection and Informed User Act would prohibit peer-to-peer file sharing programs from being installed without the informed consent…
An American University in the state of Georgia has suffered a serious data breach that exposed the social security numbers…
Introduction of new security software and the decision to allow customer ID's to be saved in the browser have come…
The Federal Trade Commission has warned approximately 100 organizations that their private customer and employee data is being shared on…
Intel has disclosed in an annual filing to the SEC that it was targeted by a sophisticated cyber-attack in January
Backup and disaster recovery specialist Weidenhammer teams up with UK IT firm Plan B to offer cost-conscious businesses disaster recovery…
The code used in the now infamous Aurora attack reported by Google has allegedly been linked to a Chinese security…
3Com is rolling out network security and performance offerings to help enterprises make the move to virtualised data centres
Symantec has found that the majority of enterprises have experienced a cyber attack in the past year, and the attacks…
Micro-blogging site Twitter is suffering from its second phishing attack this month, after direct messages allowed scammers to steal users'…
The attacks on Google and others have been linked to two Chinese colleges, according to a report in The New York Times
IT managers at small to medium sized businesses are increasingly concerned at the malware risks posed by the use of…
Search giant Google should use YouTube and its purchase of On2 to promote open video formats, according to free software…