EFF Asks Court To Declare NSA's 'Internet Backbone' Collections Unconstitutional

Thumbnail for 346386

By Tim Cushing

Source: Techdirt

DEF CON Hosting SOHO Wireless Router Hacking Contest

By Michael Mimoso

Source: Threatpost

Senator Leahy prepares bill to tackle NSA snooping

By SC Magazine

Source: SC Magazine News

Malware used to compromise payment cards at Wendy's restaurant in Michigan

By SC Magazine

Source: SC Magazine News

CIA Snags Confidential Whistleblower Communications Sent To Congress

By Tim Cushing

Source: Techdirt

IT/Dev Connections 2014 Speaker Highlight: Mike Terrill

Thumbnail for 346348

By Windows IT Pro

Source: Security Bloggers Network

8 criteria to decide which ISO 27001 policies and procedures to write

By Dejan Kosutic

Source: Security Bloggers Network

Instagram’s Android users risk having their accounts hijacked – but is that a threat to your business?

By Graham Cluley

Source: The State of Security

The Cloud is Still a Datacenter Somewhere

Thumbnail for 346353

By psilva

Source: Security Bloggers Network

Harnessing the Power of an Android Cluster for Security Research

By Dennis Fisher

Source: Threatpost

Ford and General Motors Sued Over ‘CD Ripping Cars’

Thumbnail for 346240

By Ernesto

Source: TorrentFreak

Report: Japan eyes law requiring security incident reporting

By SC Magazine

Source: SC Magazine News

Spain Likely To Pass 'Google Tax'; Makes Paying For News Snippets An 'Inalienable Right' And A New Bureaucracy To Collect It

By Mike Masnick

Source: Techdirt

Details emerge about PlugX/Kaba RAT in Pacific Rim

By SC Magazine

Source: SC Magazine News

OKCupid admits to experimenting on users

By Kate Tummarello

Source: TheHill