The US Senate has voted to end bulk collection of millions of Americans' phone records two years after Edward Snowden's first revelations. read more
Opinion by Alex Krasodomski. read more
How useful is Metadata to the intelligence community and what will they do if it goes away? read more
If even the best-resourced companies are losing the cyber-security battle, what hope is there for the rest of us? read more
Before Heartbleed: Worst vulnerabilities ever? read more
Gartner has identified three trends describing information's ability to transform business processes over the next few years. read more
Consumers are losing confidence in the integrity of the debt collection process & lack of transparency provides cover to bad actors. read more
Law enforcement experts discuss cyber-crime policing during the 'Know your adversary: Who is the cyber-criminal?' keynote at InfoSec Europe. read more
After cancelling its search for bids on a five-year outsourcing contract, US Cyber Command say a retooled version will be out by October. read more
Hackers gained access to the Bundestag's internal server, launching an unprecedented attack using Trojan viruses. read more
The US stock exchange Nasdaq is experimenting with incorporating the underlying technology of the bitcoin cryptocurrency into its pre-IPO trading arm. read more
Top secret report to the UK Prime Minister recommends a new international treaty to enforce cooperation of the US Internet giants. read more
Just Say No: Inventor of world-wide-web opposes UK government's plans to extend surveillance powers. read more
In hacker jargon, it's called a "cyber-to-physical effect." It's when a hacker reaches out from the virtual world into the real one, often with catastrophic consequences. read more. They also faked satellite images of MH17. read more
A new tool lets you easily track movements of other Facebook users by scooping up location data shared in Facebook Messenger chats. read more
Attackers can embed executable JavaScript code within an image to trigger a 'drive-by download'. read more
Fail: Stuxnet virus used to attack North Korea's nuclear weapons program five years ago. read more
There's a real requirement from both the client & the insurers viewpoint to understand internal security and the different types of insurance cover available. read more