Cyber Security
Latest about Cyber Security
![A Google Incognito Mode tab open on a mobile phone, set against a multi-color background made up of a repeating Google logo.](https://cdn.mos.cms.futurecdn.net/dAdHLanyjwZV3bW2GnzQmT-320-80.png)
Google Incognito data to be erased—but what happens next?
By River Hart published
Opinion Google's recent legal battle is just the latest in a long string of privacy fails. It begs the question—is Google really doing enough to maintain our privacy?
![Kids on Phones](https://cdn.mos.cms.futurecdn.net/UuBVch5DWJihir28NJcKm9-320-80.jpg)
Children's privacy must be a priority on social media, says the UK
By Chiara Castro published
Breaking The UK Information Commissioner’s Office requires social media platforms to better handle data harm to children by 2025. Here's what it seeks to change.
![A black AT&T sign with its logo in bright blue hanging outside a shop](https://cdn.mos.cms.futurecdn.net/mXk9iCtmSKndq3VLb6FygM-320-80.jpg)
The AT&T data leak highlights the importance of protecting your data
By Olivia Powell published
The data, which includes full names, email addresses, phone numbers and Social Security numbers, has been posted to the dark web
![The exterior of The British Library, a sandstone building with "The British Library" carved above its entrance, with a metal gate moulded to say "British Library" repeatedly beneath it. Some people, blurred due to long exposure, walk in front of the library](https://cdn.mos.cms.futurecdn.net/BuNgZPZyquqf8JnksrGkKR-320-80.jpg)
The British Library suffered a cyber attack last year—here’s why it was so impactful
By Olivia Powell published
Exploring the lessons we can learn from the large-scale ransomware attack launched at the British Library
![A group illustration of the Apex Legends cast](https://cdn.mos.cms.futurecdn.net/DqCDPB5YPah4wSoP2SBEJ8-320-80.jpg)
Apex Legends tournament disrupted by rogue RCE exploit hack
By River Hart published
Apex hacks RCE hacks caused chaos during last weekend's ALGS regional finals. Wondering what happened and why? Here's everything you need to know.
![Laptop, phone and hologram of woman for data protection, safety software development or cybersecurity programming.](https://cdn.mos.cms.futurecdn.net/Qf8GMQiNZHKGz9N9xb6867-320-80.jpg)
9 women in cybersecurity you may not know but you should follow in 2024
By Chiara Castro published
International Women's Day For International Women's Day, I asked influential figures in the cybersecurity industry what it's like being a woman working in tech.
![Signal logo on the AppStore displayed on a phone screen and Signal logo in the background are seen in this illustration photo taken in Poland on January 14, 2021.](https://cdn.mos.cms.futurecdn.net/mTkfstP2UnsXt7BdGA5vde-320-80.jpg)
Signal officially abandons phone numbers sharing in the name of privacy
By Chiara Castro published
Breaking Currently available only in beta, you can now use a username instead to chat with other people on the Signal app. Here, all you need to know to get started.
![Zerod hacker marketplace homepage.](https://cdn.mos.cms.futurecdn.net/9gkuohXUMTKtzSEHUjHVVb-320-80.png)
World's first ethical hacking marketplace launched by Zerod
By Nigel Powell published
Hire a hacker The world's first hacker marketplace for businesses launches. Find out why Zerod is shaking up the industry for pen-testing.
Get daily insight, inspiration and deals in your inbox
Sign up for breaking news, reviews, opinion, top tech deals, and more.