Eyes on you: Experts reveal police hacking methods (Update 2)

Law enforcement agencies across the globe are taking a page out of the hacker's handbook, using targets' own phones and computers to spy on them with methods traditionally associated with cybercriminals, two computer security ...

Malware worms its way into more apps, study finds

Malicious software is increasingly making its way into mobile phones through "cloned" versions of popular apps, and software weaknesses in legitimate ones, security researchers said Tuesday.

ISPs need to do more to tackle major cyber-attack

Warnings about the impending cyber-attack have gone unheeded and more must be done to tackle the threat of an infection, according to the Institution of Engineering and Technology (IET).

Using Microsoft products may be unethical for universities

Universities and researchers all over the world have a problem with Microsoft. It's not just that the company forces expensive and dated software on customers. Using products like Microsoft's email service Outlook is potentially ...

NSC backs disclosing software vulnerabilities

Disclosing vulnerabilities in commercial and open source software is in the national interest and shouldn't be withheld from the public unless there is a clear national security or law enforcement need, President Barack Obama's ...

page 8 from 28