Avast buys AVG for $1.3bn, giving it access to 400m PCs, smartphones, tablets and connected IoT devices
Malware targets OS X and gives attackers webcam access via Tor and full access of compromised Mac
Another round of funding for cyber-security firm backed by former Autonomy boss Mike Lynch
ANALYSIS: New zero-day vulnerability may also affect computers from other makers that used similar Intel UEFI reference code to create…
Media savvy Millennials still falling for same tricks as fraud rockets 52 percent among those under 30
Companies need to look for ways to go on the offensive against 'industrialised' cyber-criminals, finds a report from BT and…
As part of Digital Single Market, the European Commission initiates public-private investment programme to strengthen Europe's cybersecurity credentials
Large financial institutions and gaming companies are amongst those hit by the latest IoT botnet attacks
The rapidly spreading 'Hummer' Trojan installs unwanted apps, uses up bandwidth and can't be removed
'Largest assault to date' for mitigation provider Imperva Incapsula as gambling company hit by nine-vector DDoS
The appeal annuls a ruling that had prompted Facebook to block access to its Belgian site for non-users
The influx of fans to France for Euro 2016 may represent a significant security risk for enterprises
VIDEO: ESET’s Mark James tells us how to best protect from particularly painful malware
Apple will use differential privacy to collect data on groups while keeping individuals anonymous. This emphasises privacy, while giving access…
Don't fall for it. Devious malware utilises user interfaces of Android apps in order to steal sensitive data
Vulnerabilities “are as bad as it gets” says Google's Project Zero, and could endanger millions of users
The use of machine learning to identify suspicious online activity is a new and important capability in securing the network,…
Malwarebytes becomes sponsor of NASCAR team after its testing data was encrypted by ransomware
Fresh privacy concern? US Customs proposes to screen social media profiles of travellers to the United States
But Microsoft insists that only a small number of Office 365 were targetted and the attack was blocked within hours
CloudLock's technology protects content based on remote services such as Office365, Google Drive and Salesforce
An update to the CryptXXX ransomware has already received substantial ransom payments over a period of less than three weeks,…
A botnet made up of more than 25,000 hacked security cameras spread around the world is being used to launch…
The 'Bart' ransomware doesn't need to connect to an external server before encrypting a system's files and demanding £1,500
The tool, called Selfrando, could greatly improve on the attack protection provided by techniques such as ASLR, researchers say
The chip maker is reportedly looking into unloading Intel Security amid rising demand from business
The malware's multiple exploits allow it to target 90 percent of current Android devices, researchers say
Safe Habour advice. British data protection act should be used when transferring data to US, says ICO
But Intel Security’s Gordon Morrison says that a growing skills gap could be a worry
Penetration testers brute force Uber for bug bounty programme, and also find hidden $100 free ride voucher