A professor who once held top secret clearance explains how levels of classification work and where handling sensitive information gets tricky.
Successive governments have come to see the potential political gain in selectively leaking details of the budget before the big night.
Yes, Big Brother is almost definitely watching. Here, five tips for researchers on keeping you and your sources safe.
WikiLeaks' latest release details what it claims is the CIA's hacking activities, including compromising phones, TVs, cars and becoming an NSA with less accountability.
The @RoguePOTUSStaff account claims to be a genuine inside source of West Wing dirt, and hundreds of thousands of people seem to trust it.
With an explosion of media outlets that don't adhere to mainstream journalistic standards, it's became difficult for readers to know whether to trust reports based on unnamed sources and leaks.
Government agencies and contractors are now less trusting of their workers, and keeping a much closer eye on them, both on and off the job.
Breaches of confidential information are inevitable. But we can limit their size and scope, and therefore their damage.
When major data breaches happen, how are they carried out? And is there anything companies can do about them?
Online activism now means creating alternative ways to work, communicate and protest.
The rise of leaktivism: specialised platforms and organisations that turn data into a weapon to strike at government and corporate power.
Make no mistake: the odds of a palace coup just narrowed slightly.