The National Security Agency was acquiring thousands of digital communications from Americans as of 2011, according to a declassified document from the Foreign Intelligence Surveillance Court.
Former Army Pfc. Bradley Manning may have been handed a 35-year prison sentence on Wednesday for leaking classified documents, but “his fight is not over” and he could be free much sooner, according to Manning attorney David Coombs.
Microsoft’s Security Essentials (MSE) remains a hugely popular consumer antivirus product but new figures suggest that its Windows 8 successor, Defender, is losing out to third-party alternatives.
Acting like a software version of a Transformer robot, a malware test app sneaked through Apple’s review process disguised as a harmless app, and then re-assembled itself into an aggressive attacker even while running inside the iOS “sandbox” designed to isolate apps and data from each other.
Industrial espionage by Chinese “state-affiliated actors” was responsible for one in five data breaches reported to Verizon by customers and through a range of global police forces, the company’s annual Data Breach Investigations Report (DBIR) has found.
The UK government’s Technology Strategy Board has extended its Innovation Vouchers scheme to allow small and medium enterprises (SMEs) to bid for up to £5,000 from a £500,000 pot to improve their cyber security by bringing in outside expertise.
The Boeing Company is pioneering a way to securely bring together business IT networks with what ordinarily are entirely separate networks for industrial-control systems (ICS) in order to gain efficiencies and benefits in information-sharing in manufacturing.
Legislation, stealth technologies, and emerging data privacy markets are proving that the battle for our Internet privacy has only just begun
Cloud content sharing firm Box has hired three industry veterans to help bolster its operations.
A CIO once quipped, “Security isn’t hard, compliance is.” And in fact many companies focus their security efforts on meeting compliance requirements. But if you are audit compliant, have you in fact addressed all of your risks, or are you just kidding yourself? Is it better to focus on the risks presuming that doing so will cover you off on the compliance side? Network World Editor in Chief put the question to two practitioners, both of whom come down on the side of risk.