From Our Partners
Top IT Security Bloggers
Google Chrome to *finally* protect your passwords a little better
It looks like Google may have realised the error of its ways - and is considering a U-turn regarding how it protects passwords in Chrome.
Tesco installs face-scanning technology so it can target you with ads
Tesco is introducing face-scanning technology at its petrol stations across the UK - so it can target you with adverts.
Take the poll, and tell us what you think.
The top 50 woeful passwords exposed by the Adobe security breach
In a screw-up of colossal proportions, Adobe didn't properly protect the password data on its servers... and now we can all see the most common passwords used by its customers.
25 years ago – the Morris worm struck the internet [VIDEO]
On November 2, 1988, computer viruses made the mainstream news headlines for the very first time - with the spread of the infamous Morris worm across the internet.
Find out more about the attack, and watch a news report from the time.
This secret post-it note shows the NSA tapping into Google’s data centers
Google and Yahoo's worldwide network of data centers are said to have been compromised by the NSA, according to a newly-leaked document.
Giraffe virus hoax spreads on Facebook, as users fail to see the joke
Is your iPhone safe from pictures of giraffes?
The latest virus hoax spreading on Facebook says it's not.
Chinese kettles accused of spying, sending data back to remote servers
A batch of Chinese kettles have been intercepted on their way into Russia, which had the ability to do much more than just boil water.
Is one terrorism death a year really too high a price to pay for freedom from intrusive surveillance?
One death in a year through a terrorist act seems too high a price to pay for freedom from intrusive surveillance.
Do we value our privacy as little as that, asks guest contributor Philip Le Riche.
British man accused of hacking US military servers, planting backdoors
28-year-old man accused of exploiting vulnerabilities in Pentagon computer servers, and accessing information about military personnel.
Amy Winehouse is a victim of the Buffer hack (despite being dead)
Whether you're a celebrity, a corporate brand or just an individual - learn a lesson from this security breach.
Banking & Finance
Social Networking Security
Wireless / Mobile Security
Malware / Cybercrime
PCI & Compliance
Identity & Access
Identity & Access
Identity Theft Prevention
Strategic Planning / ERM
Metrics / Budgets
Security Career Staffing
Women in Security
Resources / Whitepapers