Users of Smart TV should be careful of what they say in front of it, according to Samsung
The Twitter account of a US restaurant chain was hacked over the weekend, with attackers using it to post offensive…
Microsoft patched more Common Vulnerability Exposures in 2014 than any other year, but number of critical fixes falls
Acuity study predicts that mobile payments and online banking will drive biometrics windfall
How much do you know about the biggest threats online?
A hacker who made a number of death threats in Japan has been jailed in a case that captured the…
US healthcare insurer admits 80 million customer and staff records compromised in a damaging cyber attack
New proposals governing NSA data collection don't go far enough, campaigners complain
Search giant also banned 214,000 advertisers and removed 250,000 sites in fight against malware
Good Technology and Samsung continue collaboration with Android integration
Firm's shadow IT buster 'Content Security Service' will aim to secure work content even with BYOD workers
The cost to respond to and remediate one security breach resulting from failed malware detection technology is approximately $62,000 per…
Former gamers speak of carrying out thousands of killings through the CIA's Predator drone programme
User Data Compromised In Raptr Gamer Social Network Hack
Google is supplementing its existing bug bounty programmes with a scheme that will pay top researchers to investigate key services
Government IT leader will leave post as MP for Horsham at the next election
Talk about a ruined Valentines Day - hacked sex toys can be accessed to post images and even video
Seen Die Hard 4.0? That’s what’s coming soon if you don’t shape up, Kaspersky warns world leaders
Our round-up of the expert views concerning keeping your data safe online
Google agrees to alter its UK privacy policy after escaping a fine by Information Commissioner
Arbor's 10th Annual Worldwide Infrastructure Security Report points to the growing attack bandwidth and application layer attacks
Protectionism or national security? China demands foreign firms hand over source code for inspection
Colt's John Hayday discusses security needs in today's data centre
Smartphone users need to be aware of what data their mobile apps have access to, say Silent Circle and Blackphone
"Hackers gonna hack hack hack hack hack", it seems, as Taylor Swift's Twitter account not able to “shake it off”…
How much do you trust your employees with the passwords to important documents?
Facebook, Instagram and Tinder were all affected by the outage, which left millions across the world unable to access the…
Kaspersky Labs' David Emm tells TechWeekEurope that the security threat to mobile payments is still in its infancy - but…
Ex-Motorola boss reveals how Apple stole the technology away to use in the iPhone
After settling a US class action lawsuit, Sony is offering affected US users game downloads or, in some cases, cash…