A Swedish Court has sentenced the four owners of The Pirate Bay to a year's prison and a £2.4 million…
The security organisation founded by end-user chief security officers is focusing its attention on secure approaches to cloud computing
The UK government launched a campaign to use new technology to help beat the recession - amid a legal dispute…
Lenovo is encouraging the end of passwords taped to PCs, with its Hardware Password Manager, a server solution that enables…
The Apple iPhone 3.0 finally addresses security and emerges as a serious business smartphone, even if the BlackBerry is still…
Microsoft's OOXML formats are controversial - but the older Office formats will be a danger as security holes go unpatched,…
Employing sophisticated tools such as memory-scraping malware and unique packet sniffers, organised crime led a record assault on databases in…
The new variant hooks itself deep within Windows to thwart efforts at spotting it
In a nod to the economic climate, the conference offered laid-off security pros scholarships to attend the event in 2009,…
The UK Government failed to respond to privacy issues raised by BT's secret trials of the Phorm behavioural ad targetting…
The latest security bulletins address issues being targeted by hackers in the wild, including vulnerabilities in Microsoft Office Excel and…
Spam wastes enough energy to run 2.4 million homes, says a report designed to give more ammunition to anti-spam action
The recession is creating an army of disaffected ex-employees - many of whom will still have access to their former…
A 17-year old hacker is reportedly backing off after exposing vulnerabilties on the microblogging site
New Endpoint Platform and Client-Server suite should take out some of the legwork, company promises
An Amazon.com glitch reduced the sales rankings of 57,000 titles - but something isn't right about the story of the…
Adobe's Flash player and Acrobat software were the top targets for hackers attempting to install malware on Europe's PCs during…
Security professionals should try to add value to business and make new business models possible, instead of focusing on restricting…
Experts contend the simple ability to map the electrical infrastructure is not the same as knowing how the system is…
A court has ruled that Microsoft's piracy-busting Product Activation system used technology patented by someone else. Meanwhile it was fined…
The hackers behind the infamous Conficker worm are making their move, roughly a week after many people expected
Storing and securing data more efficiently is the way IT managers are going to have to go during the recession
Foreign spies placed malware on the US electricity grid. Where does this leave government security, and the Green Grid?
From next week, Microsoft Windows XP and Office 2003 support and fixes will cost money. But that is much better…
The HyTrust Appliance is designed to give IT administrators greater control over their virtual environments and ensure greater security and…
The government has awarded contracts to CSC and IBM to upgrade biometric passports and other systems that will pave the…
Creating a more efficient and secure way to exchange such medical information will lead to better patient treatment and improved…
If successfully exploited, the PowerPoint bug could enable hackers to take control of the victim's computer
If successfully exploited, the attacks give the hacker complete control over the database server operating system, file system and the…