‘Highly sophisticated’ Duqu 2.0 threat infects nuclear discussions and even attacked Kaspersky’s own systems, firm admits
Surprisingly light Patch Tuesday update brings critical fixes for Microsoft's outgoing web browser
Open letter to President Obama highlights tech opposition to efforts to weaken encryption systems
Six trillion spam messages sent worldwide in the first three months of 2015, McAfee Labs report finds
Pro-Assad Syrian Electronic Army claimed responsibility for the hack and defacement of the Army's portal
Dropbox debuts a new API and an Active Directory connector, both aimed at helping enterprises better secure and manage their…
Check Point Endpoint Security helps protect 1,400 NHS Blood and Transplant computers
China has been blamed for a hack in which huge amounts of US Government officials' data was stolen. China has…
Apple Pay could be hijacked by criminals using fake login page, Wandera warns
China denies it was behind massive breach of US government data and employee records
Security firm helps build ‘the most secure house in the world’ to keep Ferrari safe
Can you bargain with a Russian hacker over the ransom fee to unlock your computer? Yes says one researcher
SecurEnvoy's Steve Watts tells us how hackers are gaining more and more power through unsecured knowledge access points
Cloud security tool 'Data Loss Prevention 14' will feature Box cloud storage integration and Office 365 compatibility
The malware is part of a wider campaign targeting the spread of online banking, according to researchers
BAE Systems Applied Intelligence announces cloud-based cyber security tools for commercial organisations
The Hola VPN service exposes users to security, privacy and legal issues, security researchers have claimed
Freedom of Information (FoI) requests submitted to ICO and UK police show just 1 in 10 stolen devices with personal…
Google admits users feel they don't have enough control over how their information is used to power its services
Too many European firms are nowhere near ready for a data breach, with no incident response plans in place
Attackers access the personal details of more than one million individuals
The US Senate failed to reach a compromise in time to save key Patriot Act surveillance powers
The judge argued Silk Road was run as a profitable criminal enterprise that expanded the market for dangerous drugs
Iron Mountain's Phil Greenwood explains how protecting people is vital to protecting vulnerable data within the public sector
North Korea spends up to 20 percent of its military budget honing its cyber-attack capabilities
Government confirms sweeping new powers for the security services in fresh blow to privacy campaigners
How UserLock enables the School of Engineering & Digital Arts, University of Kent, to provide secure 24-hour access to computer…
Ukranian ransomware demands up to $1,500 to unlock victims' devices
British measures to block porn on computers and mobile devices by default faces European challenge
iPhones will restart following SMS containing Arabic text, user reports say