British companies are facing fines of up to half a million pounds for data losses, as experts warn that fraud…
Google gets praise for standing up to China, while Facebook's Mark Zuckerberg has unleashed a storm of protest over privacy.…
IBM, which once again was the top patent producer in the industry in 2009, is now ready to share its…
Google says it is no longer willing to censor search results in China, and is considering closing its offices due…
Absolute Software has added Intel technology to its anti-theft software, which can at the touch of a button turn a…
A group of academic security researchers have cracked the 768-bit RSA encryption, used for protecting sensitive data in transit
Security vendor McAfee has warned in a new report that spammers are increasingly turning to free-hosting websites to provide spam…
In a sign of Twitter's increasing commercial focus, the micro-blogging site has announced it is to hire 27 new employees…
Privacy is no longer a social norm, according to the founder of Facebook, Mark Zuckerberg commenting on the rise of…
Heartland Payment Systems agrees to pay as much as $60 million (£37m) to Visa to address losses by credit and…
Microsoft is planning to plug a Windows security hole rated critical for Windows 2000 systems, in the company's first Patch…
Cisco says it has bought Rohati Systems, a company specialising in agentless transaction networking systems
Storage provider Iomega is now offering technology that will allow users to keep a virtual copy of their computer in…
Security expert condones Facebook's decison to block Web 2.0 Suicide Machine, which deletes profiles from the social networking site
IBM's Rational AppScan and ISS Proventia IPS GX5108 combine proactive application vulnerability scanning with live IPS attack reports to provide…
The Irish rocker has cited China's clampdown on online free speech as evidence that ISPs could do more to tackle…
EMC has acquired governance, risk and compliance software maker Archer Technologies
There are red faces over at Kingston after the company admitted that a number of its encrypted USB sticks can…
The security company has discussed its plans for the SaaS space in the coming year
A security researcher uncovered some holes in Google Calendar and Twitter that may allow an attacker to steal cookies and…
TJX hacking mastermind Albert Gonzalez is facing a longer stretch in prison after pleading guilty to yet more hacking charges
Microsoft is attempting to downplay concerns over a security vulnerability in IIS, and insists it would need an insecure configuration…
The number of illegal mobile phones and SIM cards in prison has trebled in just two years leading to concerns…
The mobile industry has downplayed worries that GSM phone users are now vulnerable to having their telephone calls intercepted
U.S. President Barack Obama has chosen Howard Schmidt to step into the role of cyber-security coordinator
From serving malicious ads to poisoning search engine results for recently deceased actress Brittany Murphy, rogue antivirus operations have been…
The networking giant's technology is being used to underpin an online evidence repository developed by stun-gun maker Taser International
Illegal file-sharing is as widespread as ever, despite plans for new government legislation to cut off pirates, but Rage Against…
The attack that took down Twitter on 17 Dec. used legitimate credentials to log in and redirect Twitter.com to a…
The government's decision to gather personal data on every traveller into and out of the UK is under threat from…