The tool is intended for defensive purposes, but could also be used to facilitate password attacks
Hidden audio commands can be used to take control of popular voice-activated devices, researchers say
A trove of data on 80,000 users did not come from Amazon's systems, the company said, and may have been…
The malware, thought to originate in China, generates £232,000 per month in counterfeit ad revenues
A malicious version of the popular game is seeking to take over Android handsets
Playing catch up? Facebook tests encrypted "secret conversations" after last month's security scare concerning chats
Security researchers warn of a serious stack overflow vulnerability in a number of devices from D-Link
New report highlights security dangers for businesses during major sporting events like Euro 2016
Avast buys AVG for $1.3bn, giving it access to 400m PCs, smartphones, tablets and connected IoT devices
Malware targets OS X and gives attackers webcam access via Tor and full access of compromised Mac
Another round of funding for cyber-security firm backed by former Autonomy boss Mike Lynch
ANALYSIS: New zero-day vulnerability may also affect computers from other makers that used similar Intel UEFI reference code to create…
Media savvy Millennials still falling for same tricks as fraud rockets 52 percent among those under 30
Companies need to look for ways to go on the offensive against 'industrialised' cyber-criminals, finds a report from BT and…
As part of Digital Single Market, the European Commission initiates public-private investment programme to strengthen Europe's cybersecurity credentials
Large financial institutions and gaming companies are amongst those hit by the latest IoT botnet attacks
The rapidly spreading 'Hummer' Trojan installs unwanted apps, uses up bandwidth and can't be removed
'Largest assault to date' for mitigation provider Imperva Incapsula as gambling company hit by nine-vector DDoS
The appeal annuls a ruling that had prompted Facebook to block access to its Belgian site for non-users
The influx of fans to France for Euro 2016 may represent a significant security risk for enterprises
VIDEO: ESET’s Mark James tells us how to best protect from particularly painful malware
Apple will use differential privacy to collect data on groups while keeping individuals anonymous. This emphasises privacy, while giving access…
Don't fall for it. Devious malware utilises user interfaces of Android apps in order to steal sensitive data
Vulnerabilities “are as bad as it gets” says Google's Project Zero, and could endanger millions of users
The use of machine learning to identify suspicious online activity is a new and important capability in securing the network,…
Malwarebytes becomes sponsor of NASCAR team after its testing data was encrypted by ransomware
Fresh privacy concern? US Customs proposes to screen social media profiles of travellers to the United States
But Microsoft insists that only a small number of Office 365 were targetted and the attack was blocked within hours
CloudLock's technology protects content based on remote services such as Office365, Google Drive and Salesforce
An update to the CryptXXX ransomware has already received substantial ransom payments over a period of less than three weeks,…