Vodafone says Cyber Essentials certification proves its security credentials, but some say government scheme isn't a serious benchmark
The group dubbed 'CyberVor' has been collecting data from thousands of websites, using automated botnets to check for vulnerabilities
The Glasgow 2014 team needed 2400 PCs, 520Gbps of bandwidth and 123TB of storage to deliver a successful Commonwealth Games,…
A compromised computer could hit 5.5 million email addresses with spam every week without its owner ever noticing
Google reports a Gmail user to the police after discovering illegal images in his email
Flaws in SATCOM firmware could compromise security of planes and ships, warns Ruben Santamarta, who will show his findings at…
Ofcom issues advice for consumers wanting to unlock their phones, with fees, charges and times varying by operator
Red faces and embarrassment all round at Mozilla after a serious breach of developer details
Are Google's worst fears about “right to be forgotten” requests coming to fruition, with Wikipedia entry removal?
China excludes two big names in the anti-virus industry as distrust of outside technology continues to grow
All bets are off, as criminals fleece Paddy Power of its customer records - four years ago
The security of USB devices is fundamental broken by a hack that cannot be detected, warns researchers
An American judge sets a legal precedent by ordering Microsoft to surrender emails stored in an Irish data centre
Bad apps can fool Android phones using the Fake ID flaw, and take your credit card details. Your provider may…
“To prove you are not spies, we require your source code”, Russia tells Apple and SAP
Tor warns users they may have been unmasked by a long-running campaign
Security vendor believes AETs are a serious problem ignored by the majority of its competitiors
Former NSA director Keith Alexander is filing for security patents and promising an intrusion detection service
Secusmart secured Angela Merkel's BlackBerry against NSA snooping. Now BlackBerry wants to offer that more widely
Connecting devices to the Internet is a great idea, but shouldn't we do it securely?
Samsung says "extreme" workplace restrictions might not be the best solution for business security
Juniper is to offload its Junos Pulse mobile security business as part of a wide-ranging restructure
The Russian Interior Ministry offers £81,600 for a method to track users of the anonymous Tor network
Researchers use free Cloud accounts to create a botnet, rather than hijacking computer resources from innocent victims
The privacy watchdog gets money to cope with the additional workload created by the controversial DRIP bill
Inadequate security resulted in the loss of more than a million customer credit and debit card numbers
Cyber criminal gang devises a new, complex method of hijacking SMS to steal money
Two arrests made in London as police swoop on international gang that defrauded eBay's online ticketing service
Hackers steal partially encrypted records from an events website that belongs to the bank
TAILS Linux, used by Edward Snowden to communicate with journalists, is patching holes in one of its network overlays