Privacy is at a premium. Whether it's the NSA, a hacker cabal, or corporate marketers, someone is looking over your shoulder every time you use your PC.
Orwell, Zamyatin, Huxley and others foresaw the dangers of utopian views of technology
The official calendar for Joshua Wright, a commissioner with the U.S. Federal Trade Commission, shows he has had many meetings with technology company lobbyists,...
A botnet that was slowly shrinking has taken on a new trick: brute-forcing routers set to easy-to-guess credentials.
The revelation that Microsoft read emails from a user’s private account underlines the importance of understanding terms and conditions
Services that mask your identity online can preserve your privacy, but they can also be slow and unwieldy. Disconnect said Monday it had tweaked and upgraded its...
You can accuse Windows 8.1 of a lot of things, but one thing you can't say about Microsoft's latest OS is that it lacks web integration. Thanks to deep integration...
There’s general agreement that Safe Harbour is no longer fit for purpose, less so on alternatives
Web servers running a long-outdated version of the Linux kernel were attacked with dramatic speed over two days last week, Cisco Systems said on Thursday.
Read on to learn more about cyber protection in “secure communities.”
This paper will now discuss those different elements and attempts to enrich the debate on the various legal issues raised by IoT.
Read this report for an in-depth analysis of the latest security threats and trends.
This white paper provides advice on how organizations create an environment for secure data transfer.
This article provides five key DDoS mitigation steps enterprises can take now to prepare for a future attack.
This paper looks at how internal security threats are affecting UK organizations and, in turn, how these are being managed.
This report offers a study of attitudes, behavior and best practice within European business, including an updated Information Risk Maturity Index.
Featuring a survey of over 200 business & IT professionals from 42 countries, this white paper from IDG Connect looks at awareness of Data Sovereignty...
This white paper presents a social study that reveals attitudes to wearable technology and examines how cloud computing is enabling this new generation...