Interest in a free, encrypted web chat service called Cryptocat has spiked following the detainment and interrogation of its developer at the US border.
Stella Rimington, the former Director-General of MI5 has had her laptop stolen after landing at Heathrow airport.
Is the data on your laptop properly secured?
Ooops. If you're running a terrorist organisation, it might make sense to encrypt your files.
Clearly Osama Bin Laden didn't realise that - as some of the documents seized during the raid on his hideout in Pakistan have been made public for the first time.
Over 10 million credit cards may have been stolen by criminals who compromised a credit card processing company last month. Read on to find out what happened and what actions you may wish to take to protect yourself.
Are you encrypting the data you keep in the cloud? Or are you trusting the cloud storage providers to do a decent job at security?
Prosecutors are keen to discover what is on the encrypted laptop of Ramona Fricosu, a Colorado woman accused of committing financial fraud.
The case has raised interesting questions of whether you can be forced by law to hand over your password, or decrypt your computer.
A company claims it can bypass Apple's FileVault 2 disk encryption "in minutes," as well as volumes encrypted with TrueCrypt.
If you spend a lot of time paying attention to IT (in)security it can drive you to rant on occasion. This is one of those occasions, as too many companies are putting their future and their customers at risk thinking that "IT security isn't our busniess".
George Fried,an, CEO of Stratfor, came forth with a public statement explaining what happened in the attacks against his company last December. He admitted fault, took responsibility and accused Anonymous of censorship that doesn't come openly from governments, but rather from people hiding behind masks.
Ramona Fricosu, accused of committing financial fraud, is currently in a court battle fighting to keep her encrypted data private. The prosecution say that if the government fail to demand data decryption, it will harm public interests. This article looks at the arguments for both sides and asks whether this would be possible under UK law.
A professor at Utah Valley University analyzed the leaked password hashes stolen by Anonymous from security firm Stratfor and determined even their security minded customers choose weak passwords.
Researchers have published a paper showing how a feature implemented in modern Wi-Fi routers intended to make securing them easier, in fact makes them insecure by default.
We bought a stash of USB keys at a major transit authority's Lost Property auction, and took a look at the sort of information people leave on the train.
Two-thirds of the keys were infected with malware, and nothing on any of the keys was encrypted...
With the bring your own device (BYOD) gaining momentum, do you know how your users are managing to move their data to and fro? In all likelihood they are using the cloud. Read on for the risks and strategies to protect your sensitive information in the cloud.
Kiwicon opened with a software engineering talk which was intensely focused - a case study of a single-line bug in a single source file in a single module in a 70MBbyte programming language distro.
Paul Ducklin reports from Wellington, New Zealand.
Stanford hospital lost 20,000 sensitive records through a mistake made by a third party billing company. When will our electronic health records be properly safeguarded?
Reports from Pakistan suggest the country's telecomms authority is pressing ISPs to comply with regulations which restrict the use of end-to-end encryption.
But this won't improve security, even against militants. In general, it will make things worse.