Google chairman Eric Schmidt believes that unbreakable encryption will become reality in 'our lifetime'.
Researchers with the University of California's College of Engineering and the University of Michigan have identified a weakness they believe exists across Android, Windows and iOS operating systems that could allow malicious apps to obtain personal information.
The Heartbleed security issue may be six months old, but it remains a major problem.
The Institute of Electrical and Electronics Engineers (IEEE) has formed a new advisory group with the private sector, and is already advising software developers to ensure that their applications are secure.
UK and European companies in industries including automotive, finance, energy and telecoms are being attacked by new Trojan malware called 'Carbon Grabber' that steals online banking password and other credentials.
SCADA systems are essential to the smooth running of critical infrastructure but, as evidenced by the Stuxnet attack, they can be exploited through software and hardware vulnerabilities, and human error. But experts contest if they are really under threat.
This week's In Case You Missed It looks at rumours on a new NSA insider, hackable living rooms and if police are turning the tide on cyber-criminals.
Here are the five most popular articles, as read by you the reader, in the week for August 15 to 21.
Companies must think like a hacker and commit to penetration testing to protect themselves from data breaches, says Chema Alonso.
App vulnerabilities need to be thought about holistically, so the network and database in which they reside also need to be considered says Josh Shaul.
The growing impact of web exploits isn't just limited to the enterprise market and must be countered on an industry-scale, says Pedro Bustamante.
This is how to secure data in the cloud
Exclusive video webcast & Q&A sponsored by Vormetric
As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.