Malware, social engineering and dodgy ticket sites. Here are the security threats you should be looking out for during Euro…
Blue Coat research shows significant amounts of cloud use in firms is not sanctioned
ANALYSIS: Facebook founder and CEO Mark Zuckerberg made a mistake that many, perhaps most, people make and reused passwords for…
Dr Web researchers find new malware that can spread itself and avoid detection on Windows systems
Journalist sources must be protected says committee of MPs, but admits bulk data collection can be justified
TechWeekEurope will be at Europe's biggest cybersecurity event next week, speaking to the biggest names in the field and sharing…
Microsoft says Advanced Security Management can protect networks and make Office 365 deployments more effective with new dashboard
Privacy setback? US appeals court rules police don't need warrant to obtain cell tower records from mobile operators
ANALYSIS: Newspapers and Web sites of all kinds are fighting the use of ad blockers as a threat to their…
GOOGLE I/O 2016 ANALYSIS: Nobody knows what security is planned for Google Home smart assistant, but buyers need to think…
Peter Galvin, VP of strategy, Thales e-Security, offers a step by step guide on how security teams can ensure their…
Nulled.IO forum used to sell credentials and cracks is itself hacked, potentially allowing law enforcement to solve other attacks
Emily Ratliff of the Linux Foundation explains the considerations to take when planning to fuzz your open source project
California court rules that social media giant should not have access to personal details garnered from photographs
Security specialists at RSA have warned that too many companies have implemented IoT "security through obscurity"
Google switches on Blogspot HTTPS by default, allowing admins and users an opportunity to encrypt their traffic
Microsoft patches Office 365 vulnerability that had not been exploited in the wild despite its relative ease
Ian McEwan, VP EMEA, Egnyte, examines the difference between privacy and security, and how we can achieve both
2016 Trustwave Global Security Report reveals shocking cybercrime trends
Box CEO Aaron Levie says there needs to be a discussion between the tech industry and authorities about digital regulation…
Biometrics technology has been around for a while, now it’s time to utilise it properly, Intelligent Environments CTO tells TechWeekEurope
Tinder's privacy comes into question as new service lets people find out who is using the application
Samba and Microsoft engineers have warned system administrators to expect a critical patch on 12 April
Poll: 54 percent of readers say law enforcement agencies should be able to access phone data - but most say…
FBI announces it has accessed the locked iPhone belonging to the San Bernardino shooter, claiming it "no longer requires the…
Tim Cook thanks the public and other tech firms for their support in battle against the FBI over iPhone encryption
A group called NSHC claims responsibility for SVP hack and SBB DDoS assault, but not a separate incident affecting
Vodafone will provide tools, services and advice to businesses as it seeks to take advantage of growing demand for security
Ryan MacDougall, senior security consultant at Coalfire, details the simple techniques he (hypothetically?) used to breach a major bank
Cisco's European cybersecurity director says company can break down barriers to digitisation, simplify security processes and make the most of…