The company warns that attackers are targeting a vulnerability in Internet Explorer that can be used to hijack machines
New lineup of Dell Vostro laptops feature Intel Core i7 processors and high-end M4500 workstation is first to combine Nvidia…
Despite increased automation capabilities, IDC points to a range of data centre approaches that are driving higher management spending
A Trojan hidden within software for the Energizer Duo USB battery charger may have been around since May 2007, according…
Almost a quarter of industry professionals are unable to define cloud computing, but will a new industry forum’s code of…
As the government prepares to launch its Cyber Security Operations Centre, Reed Henry of ArcSight discusses the importance of protecting…
Microsoft is planning two security updates for Patch Tuesday to address eight vulnerabilities, and reminded users it is terminating support…
Files stored in Google Docs or in Gmail are broken up into digital pieces and stored on random servers for…
The details of a Russian botnet that targets Russian banks instead of Western victims has been revealed at the RSA…
A security researcher believes that the Chinese hackers responsible for the Google attack managed to steal valuable source code
Greenpeace has admitted that its hosting operations are powered by coal and nuclear power, after it criticised Facebook for building…
The ICO has released a new report which includes tools to help enterprises argue a business case for data protection
Former US Secretary of Homeland Security Michael Chertoff and former Bush administration cyber-security advisor Richard Clarke laid out the privacy…
Sophos security expert Graham Cluley outlined some of the main threats targeting Facebook, Twitter and other social networking sites
Google's dispute with China shows no sign of diminishing, after the search engine giant suggested that the issue should be…
Three men allegedly responsible for the virulent Mariposa botnet have been arrested by Spanish investigators
Researchers have uncovered evidence that the botnet behind the infamous attack on Google in 2009 was active months before the…
Microsoft has issued an official blog post detailing its engineers’ thinking process behind the build of Internet Explorer 8, the…
At the RSA Conference, White House Cyber-Security Coordinator Howard Schmidt announced that an unclassified version of the Obama administration's “Comprehensive…
Security specialist Credant has warned users to turn off their laptop's Wi-Fi signals, as thieves can easily locate the devices…
Microsoft has issued a security advisory after warning of a security hole caused by an unpatched zero-day flaw on older…
American troops can now use social networking sites to help them stay in touch with friends and family whilst serving…
Trusteer's methods of tackling malware have seen it clash with other established security specialists. The company's CEO Mickey Boodaei answers…
The UN's Intergovernmental Panel on Climate Change (IPCC) has said an independent panel of scientists would be appointed to review…
RSA Conference 2010 is kicking off on 1 March in San Francisco, bringing with it a focus on the latest…
Obscene hacked tweets, apparently from MPs Ed Miliband and Harriet Harman, should be a warning for all of us to…
From executives being charged for privacy violations, to complaints from Microsoft-supported entities in Brussels and Google's joust with China, Google…
The furore over the Webcam spying lawsuit in a US school has deepened, after the assistant principal lashed out at…
Microsoft has won a legal battle that has resulted in a temporary restraining order against one of the worst sources…