The UK government is to put forward proposals that will require organizations to limit the effectiveness of data encryption, arguing it weakens security.
In an open letter to members of its own community, Bitcoin developers and contributors have called for greater cooperation over security and scalability.
It is possible to enjoy videogames by applying practical security measures that will keep us safe. In this article, we look at 8 security tips.
The internet is arguably the new frontier for communication, collaboration and business but, with criminals also using it for ill-gotten gains, it does have its bad parts too. And this is making life difficult for parents struggling to keep up with their child’s technology obsession.
Aryeh Goretsky and David Harley talk to Sabrina Pagnotta about the internet’s impact on security research.
A recent report from Piper Jaffray found that 75% of companies expected to increase their IT security spending in 2015, following a year of high-profile hacks and data breaches in 2014.
National Cyber Security Awareness Month happens every October and NCSAM 2014 has seen more events and resources than ever. This recorded webinar discusses the top topics of NCSAM 2014, from the shortage of skilled cybersecurity workers to the Internet of Things (IoT).
A strain of malware which previously targeted banks has turned its attention to users of the popular Customer Relationship Management (CRM) software Salesforce, used by 100,000 organizations worldwide.
With Black Hat 2014 in full swing in Las Vegas, it was never going to be a quiet week – but revelations about FBI malware and a trove of a billion passwords inspired furious debate too.
This week in security news saw the world’s researchers discover a whole new range of Achilles Heels for PCs, the online privacy service Tor, and even ‘connected’ gadgets such as internet fridges.
Facebook has faced repeated controversy over privacy, with features such as Graph Search revealing information which users might have forgotten they ever “shared”. But there are steps users can take to manage the way Facebook uses their information.
It is perfectly possible to “hack” a car while it is driving on the road, seize control, and force the vehicle into a fatal crash, says a car security specialist – saying that the 100-or-so computers in “connected” cars are vulnerable to attack.