Microsoft is partnering with Good Technology for a Windows Phone solution that offers encrypted end-to-end messaging

Microsoft is partnering with Good Technology for a Windows Phone solution that offers encrypted end-to-end messaging
Newly released emails paint Stratfor as a clearing house for intelligence says Fahmida Y Rashid
Google ups the reward for hackers who find 'zero-day' bug exploits in its browser
The GSMA along with Vodafone, Orange and other operators are pushing privacy rules intended to maintain users' confidence in mobile applications
Photo sharing site implements 'do not pin' code as Pinterest reaffirms commitment to copyright protection
Documents are increasingly being exchanged through the Cloud, encryption is one way to prevent their misuse
Bring-your-own-device means all manner of hardware is starting to appear on the network. Eric Doyle argues that there is safer path
Web Application Firewall touted to protect against spammers, SQL injections and DDoS attacks
Start-up CrowdStrike will demonstrate the use of a flaw in Android WebKit to take full control of mobile devices
WikiLeaks has begun publishing millions of emails thought to have been obtained from intelligence firm Stratfor in a December hack by Anonymous
Zettaset's SHadoop is intended to make it easier for organisations to control user access to data within Hadoop clusters
More than 400 companies agree to help implement the browser “do-not-track” button
Smartphone owners and social media users are more likely to become victims of identity theft, claims Javelin Strategy
Google, Microsoft and Netflix lend their support to DRM for HTML5
A US privacy bill proposed by President Obama will give Web surfers access to their data and an online tracking opt-out
Another file-hosting site linked to copyright infringement goes dark in Megaupload's aftermath
Attacks against web applications are a growing threat that Juniper hopes to challenge with its Mykonos purchase
Mobile devices are posing a growing security threat to SMBs, who often do not have adequate tools and software
Hackers publish personal details online - exposing security flaw that has existed for five years
Open source code scanned by Coverity had slightly fewer flaws per 1000 lines
Research by the Government-backed Sentinel consortium shows dangerous GPS jammer use in the UK is on the rise
BYOD is problematic, and social media is frowned upon in today's businesses, symantec told TechWeekEurope
IBM's security intelligence platform arose from the Q1 Labs acquisition and accesses 400 malware databases
Google is being sued in the United States over its placement of online ad cookies in the Safari browser
Akamai has announced Kona Site Defender security service to defend customers against various types of DDoS attacks
Richard Kirk of AlienVault introduces Open Threat Exchange, a free, open-source enterprise IT security tool
Dotcom to be placed under house arrest as fight against US extradition continues
An attack script has been posted online that can crash pcAnywhere as security researchers warn that old code can show current loopholes
Google doesn't follow P3P, but then nor does anyone else, says Google's communications vice president
Microsoft says that Safari was not the only browser that Google tricked into accepting cookies