Security News

A 17-year-old member of the infamous Lizard Squad has been found guilty of 50,700 charges by a Finnish court, but won't serve his sentence in a prison. Among other things, Julius Kivimaki (also kno...

Today, FBI director James Comey and Sally Quillian Yates, the deputy attorney general at the Justice Department, are scheduled to address the US Senate Judiciary Committee about law enforcement's need...

More than three quarters of IT security professionals (81%) believe the government should be sharing more threat intelligence information with the private sector, according to AlienVault research. ...

Human rights and privacy activists and journalists are actively reviewing the data stolen in the Hacking Team breach. Reporters of The Intercept have concentrated on going through the leaked emails...

Sports games at stadiums, hurricanes along the coast, protests on city streets, guest complaints at hotels, customer praise at restaurants, bullying at schools… Things happen at specific places. These...




