The weaponisation of information: Wars once fought on land, at sea and in the air are now being fought online.

Welcome to the age of weaponised information. As if you didn’t have enough to worry about, your smartphone and other connected devices could threaten (...)

John Lithgow warming up  the  40,000 cyber security professionals at the RSA Conference in San Francisco on Tuesday.

“Imagine a hacked planet. Imagine how the earth would be without security. The privacy we take for granted falls away. We can keep no secrets. No exch(...)

Early investigations suggest the Mirai malware code primarily used CCTV cameras and digital video recorders made by a Chinese company, Xiongmai, which has flooded the market with cheap, easily hacked IoT devices. Photograph: iStockphoto

“In a relatively short time we’ve taken a system built to resist destruction by nuclear weapons and made it vulnerable to toasters.” That was the pi(...)

Hackers used common devices like webcams and digital recorders to cut access to some of the world’s best-known websites on Friday. File photograph: Dominic Lipinski/PA Wire

Hackers unleashed a complex attack on the internet through common devices like webcams and digital recorders and cut access to some of the world’s bes(...)

Microsoft general counsel and executive vice president Brad Smith. Photograph: by Stephen Brashear/Getty

Few people at Microsoft can have the detailed and nuanced understanding of the company’s friction points – exposed via its legal challenges and policy(...)

On the surface, the Apple-FBI case seemed uncomplicated. The FBI had obtained the iPhone 5c belonging to slain gunman Syed Farook. Farook and his wife(...)

Bruce Schneier: “I think we need to start disconnecting systems. If we can’t control it, we have to not build a world where everything is connected” Bruce Schneier: “I think we need to start disconnecting systems. If we can’t control it, we have to not build a world where everything is connected”

Either we start to disconnect our increasingly networked world or we risk daunting social, safety, security and privacy consequences, a leading comput(...)

Bruce Schneier: “We’re all open books to both governments and corporations; their ability to peer into our collective personal lives is greater than it has ever been before”

A decade ago, the Irish Council for Civil Liberties cautioned that the mobile phone was in essence, the equivalent of a personal tracking device, reco(...)

Bruce Schneier, chief security officer at Resilient Bruce Schneier, chief security officer at security company Resilient, says the Sony attack, believed to be carried out by North Korea, exposed many of the major risks related to hacking.

Last year’s massive cyberattack on Sony – presumed to have been a nation state attack orchestrated by North Korea – presents many of the most pressing(...)

Data mining: It’s hard to think of anything you can do these days – online or off – that doesn’t leave a trail of data crumbs

Some 18 months after the first NSA revelations by Edward Snowden, the outrage in Europe about US intelligence snuffling through our data has dropped f(...)