2 September 2014
Two days after stolen celebrity photos were leaked, nobody is sure how they were obtained.
The leaking of intimate photos of celebrities from iCloud accounts was due to a theft of log-in information, not a security breach, says Apple.
Google has started showing old versions of its search page to people using out-of-date versions of web browsers.
Samsung has signed a deal with Nokia to use its Here mapping service on its smartphones and the Gear S smartwatch.
The BBC unveils plans to support England's computer coding curriculum with a new section of its Bitesize learning site and tech-themed TV shows.
A suburban house has been transformed to help specialists find security flaws in smart devices and stop hackers taking control.
One of the world's top technology leakers explains how he gathers his secrets.
Horizon meets the pioneer of anti-surveillance web tech
Rory Cellan-Jones explains how the anonymous browser works
After the celebrity leaks, what can you do to safeguard your photos?
The mystery about how leaked celebrity pictures were obtained
Would you take your kids to a geek festival?
Readers share their experiences of replacing their operating system
Researchers worry new cars could be vulnerable to hackers
Yet more pressure on Facebook over graphic images
What new techs can reliably establish our identities?
Theories for why the ice bucket challenge went viral
Panorama investigates Rotherham's two decade long child grooming scandal
This page is best viewed in an up-to-date web browser with style sheets (CSS) enabled. While you will be able to view the content of this page in your current browser, you will not be able to get the full visual experience. Please consider upgrading your browser software or enabling style sheets (CSS) if you are able to do so.