ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the…
iOS 9.3.3 and Mac OS X 10.11.6 fix a range of vulnerabilities but none so important as a TIFF flaw…
After lying dormant for years, flaws in the HTTP Proxy header used in programming languages and applications, such as PHP,…
Oracle's July Critical Patch update fixes 276 different vulnerabilities. Will 200-plus flaws be typical for future updates?
Cybercriminals will likely target Rio 2016 as researchers warn Olympic searches are already returning threats and federation websites compromised
University of Florida researchers say the answer to stopping ransomware is to let it onto your system first
Avast buys AVG for $1.3bn, giving it access to 400m PCs, smartphones, tablets and connected IoT devices
ANALYSIS: New zero-day vulnerability may also affect computers from other makers that used similar Intel UEFI reference code to create…
Apple will use differential privacy to collect data on groups while keeping individuals anonymous. This emphasises privacy, while giving access…
Vulnerabilities “are as bad as it gets” says Google's Project Zero, and could endanger millions of users
But Microsoft insists that only a small number of Office 365 were targetted and the attack was blocked within hours
Safe Habour advice. British data protection act should be used when transferring data to US, says ICO
The suggestion is that Apple has negelected to encrypt iOS 10 kernel in bid to encourage hackers to find security…
INDUSTRY VIEW: Security experts examine parliamentary select committee's proposals for data breach compliance, enforcement and awareness
Malware, social engineering and dodgy ticket sites. Here are the security threats you should be looking out for during Euro…
Blue Coat research shows significant amounts of cloud use in firms is not sanctioned
ANALYSIS: Facebook founder and CEO Mark Zuckerberg made a mistake that many, perhaps most, people make and reused passwords for…
Dr Web researchers find new malware that can spread itself and avoid detection on Windows systems
Journalist sources must be protected says committee of MPs, but admits bulk data collection can be justified
TechWeekEurope will be at Europe's biggest cybersecurity event next week, speaking to the biggest names in the field and sharing…
Microsoft says Advanced Security Management can protect networks and make Office 365 deployments more effective with new dashboard
Privacy setback? US appeals court rules police don't need warrant to obtain cell tower records from mobile operators
ANALYSIS: Newspapers and Web sites of all kinds are fighting the use of ad blockers as a threat to their…
GOOGLE I/O 2016 ANALYSIS: Nobody knows what security is planned for Google Home smart assistant, but buyers need to think…
Peter Galvin, VP of strategy, Thales e-Security, offers a step by step guide on how security teams can ensure their…
Nulled.IO forum used to sell credentials and cracks is itself hacked, potentially allowing law enforcement to solve other attacks
Emily Ratliff of the Linux Foundation explains the considerations to take when planning to fuzz your open source project
California court rules that social media giant should not have access to personal details garnered from photographs
Security specialists at RSA have warned that too many companies have implemented IoT "security through obscurity"
Google switches on Blogspot HTTPS by default, allowing admins and users an opportunity to encrypt their traffic