Macro malware, which is so 1990s, has made a comeback, joining other aging cyber-threats, such as PHP scripts and the…
The government will now require all contractors to obtain a Cyber Essentials certificate
The second day of the Pwn2Own 2017 hacking competition reveals Windows, macOS, Adobe Flash and web browser exploits
First day of Trend Micro-sponsored Pwn2Own competition awards $233,000 to security researchers for exploiting software
The data was swiped form a server being operated by an external contractor
ANALYSIS: Exposure of the CIA's hacking tools give an unsettling look at the capabilities of U.S. spies, but also a…
The open-source WordPress blogging and content management system fixes six vulnerabilities, including three Cross Site Scripting flaws
A 50-member team of Google engineers voluntarily worked to patch 2,600 open-source projects against a Java deserialization bug in 2016
Spammergate: Researchers discover vast database of email addresses and suggestions of cybercrime against spam kings sending 1bn messages a day
Eugene Kaspersky says change is needed in order to defend against IoT security threats during theatrical appearance at MWC 2017
Firemon CTO Paul Calatayud explains why he calls it the Internet of Malicious Things and why virtualisation is the greatest…
Carbon Black believes now is the time to move on from traditional antivirus (AV) software and embrace the next generation…
Hackers, ransomware, and malicious code do not seem to be going anywhere in 2017
Enterprise cloud security. Lock up your virtual network with 'industry first' terabit-level security gateway
INTERVIEW: Avast bought AVG for £1bn last year so it can gain access to 1 in 3 PCs around the…
The brand new Patch Tuesday will have to wait a bit longer for its debut because of a botched update
Georgia Tech researchers have created ransomware that can attack critical infrastructure
BAE survey says that unless there is more coordination between executives and IT departments, hackers will find holes to exploit
Trend Micro confirms a content spoofing vulnerability allowed fake articles onto its blog and says firms should respond honestly and…
ANALYSIS: Kaspersky Lab has discovered a new strain of malware that hides in memory and trusted applications while it stealthily…
Freedom Hosting II had 10,000 Tor-based webpages rendered inaccessible
Startup emerges from stealth with new funding and the promise of improving threat detection by automating activities that typically require…
The search company paid out over 1,000 individual rewards in 2016
Cisco also finds that malware attacks come with costly consequences for targeted businesses
Cisco’s Talos researchers discovered the threat which sported unusual cyber features
We're all internet users, so we all must know how to spot fake apps and how to keep our own…
Two dangerous kernel bugs highlighted by Google's Project Zero have been squashed
Meitu has exploded in popularity but beware of the data demands it makes
Another iMessage bug has been found, affecting most versions of iOS
Patch Tuesday is changing: From February, Microsoft will communicate security updates via a dynamic online portal rather than a static…