Search engine Google is in hot water after a privacy watchdog saw orange and ruled that its method of bringing in personal data from its many different online services violates Dutch data protection law.
Spies in the land of the free were looking at what sort of porn people were downloading so that they might have a weapon with which to blackmail them.
British Prime Minster David Cameron has found support for his internet crackdown from the People's Republic of China.
Assisting IT directors and managers in creating and implementing the most effective cloud-based disaster recovery strategy for their organization.Implementing the tactics laid out in this whitepaper can help reduce your overall advertising network latency.While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?The cost of downtime to your business is higher than it ever has been. RaaS is designed for the recovery of full applications so you’re up and running faster after a declaration.
Over 170,000 people are part of the Sophos community on Facebook. Why not join us on Facebook to find out about the latest security threats. Don't show me this againHi fellow Twitter user! Follow our team of security experts on Twitter for the latest news about internet security threats. Don't show me this againDon't forget you can subscribe to the SophosLabs YouTube channel to find all our latest videos. Don't show me this againHi there! If you're new here, you might want to subscribe to our RSS feed for updates. Don't show me this againAlready using Google+?
PM Tony Abbott and Indonesia's President Susilo Bambang Yudhoyono are embroiled in a diplomatic row over Australia’s spying activities revealed by Edward Snowden (Reuters)Indonesia has suspended military and intelligence cooperation with Australia in an escalating diplomatic row sparked by reports that Canberra spied on President Susilo Bambang Yudhoyono.Yudhoyono ordered Indonesian security forces to halt joint military exercises, intelligence exchange and anti-people-smuggling operations with Australia until Canberra provided an official response to allegations that his phone, that of
As Bitcoin becomes an increasingly popular form of digital cash, the cryptocurrency is being accepted in exchange for everything from socks to sushi to heroin.
It is a myth that the US government wants to arrest Julian Assange, according to an unnamed top US cop.
It appears that Cisco Microsoft and IBM are paying the price for the US government's addiction to spying on the Internet.
Your boss is the greatest threat to the Internet. Executives with an internet porn habit are not only infecting their systems with malware, but are keeping reporting of the viruses secret to hide their red-faces.
Hackers have stolen the full card details of at least 376,000 people in a cyberattack on Irish marketing company Loyaltybuild. Loyaltybuild runs reward schemes for companies across Europe, including one for the Irish supermarket chain SuperValu. Some 70,000 SuperValu customers have had their full card details stolen, confirmed ...
Recent revelations about NSA spying have given fresh impetus to the dream of a purely German Internet. Deutsche Telekom believes it could introduce a system safe from prying foreign surveillance, but some criticize the plan as pointless.Even before it emerged that the National Security Agency had wiretapped her ...
A hacker in your living room: researchers have shown how internet-connected TVs can be remotely manipulated. Smart TVs are bringing smartphone-like features to the telly, but their makers aren\\'t quite baking-in the same security that Apple and Google have in their mobile platforms.Stick an embedded computer, operating system,
Facebook has scanned millions of email address and password pairs hackers dumped online from Adobe\\'s user account database – so that it can force its social networkers to change their passwords if they used the same logins details for both websites.In early October, Adobe warned of \\'sophisticated attacks\\' ...
(Editors note: In this guest essay, Rohit Sethi, Vice President of consultancy Security Compass, examines the implications of HTTPS, the protocol for secure network communications, coming under attack.)HTTPS is vulnerable to attack, and we can expect the situation to worsen over time. In two to five years, serious ...
British spooks used spoof sites of Slashdot and LinkedIn to distribute spying malware, a German newspaper has claimed.
Ever since Edward Snowden leaked information about massive government surveillance programs there has been a lot of news, debate, and controversy about the NSA and other government agencies in the US and abroad.
The accountants at Google must be sweating in their boots after Brazilian judges ordered them to hand over private data collected through its Street View program.
Digital security firm LastPass announced Thursday that it had discovered passwords, email addresses and other data linked to Adobe Systems (ADBE) customer accounts on websites used by hackers.LastPass says was able to identify user data from a staggering 152 million Adobe accounts. That would contradict Adobe’s claim -- ...
The Deep Web (or Invisible web) is the set of information resources on the World Wide Web not reported by normal search engines. According several researches the principal search engines index only a small portion of the overall web content, the remaining part is unknown to the majority ...