A Trojan, hidden within an Android phone application, enables third parties to secretly track the location of the user via…
The use of mobile devices to carry out banking transactions is booming, Juniper Research has found, in spite of continuing…
The new breed of cyber criminal is gaining the trust of his victims by mimicking legitimate IT services organisations, warns…
Security is to remain one of the fastest-growing areas within the enterprise software market, driven by factors such as compliance…
The compromised widget launched a drive-by attack against users running Internet Explorer, Google Chrome, Firefox and Opera
Behind-the-scenes look at how search engine optimisation techniques are getting malware onto your computer, and what you can do to…
Facebook users are being targeted with a bogus "dislike" button application in a new survey scam, warns Sophos
Paul Shin Devine has been arrested in California for allegedly helping Apple suppliers negotiate favourable deals with the company
The social networking site has fixed a bug that could have allowed attackers to users' full names and photos, and…
The source code for a new jailbreak for the iPhone has been released, leveraging two vulnerabilities in Apple’s iOS mobile…
The BlackBerry ban row has now shifted focus to India, after it became the latest country to threaten to ban…
The Palm Pre handset is at the centre of concerns that attackers could turn mobile phones into bugging devices
IT staff are concerned about mobile security - but they're also worried about the cost of prevention methods, a survey…
IT security is often ring-fenced in IT budgets. But maybe it’s time to tear down that fence and save cash…
Apple has closed the door on two vulnerabilities used to jailbreak the iPhone
Google has vehemently denied reports that it is experimenting with spy drones or UAVs, typically used by special forces or…
A new variant of the Zeus trojan has cost the customers of one British bank £675,000 in unauthorised withdrawals over…
Google's headquarters in Seoul, South Korea, has been raided by police looking for data gathered from unsecured Wi-Fi networks
The BBC has created a piece of smartphone malware disguised as a simple game, to draw attention to the smartphone…
The net neutrality plan, proposed by Google and Verizon, would implement previously stated principles in FCC filings
As embedded security become the norm, vendors talk about it less and less, but embedded security shouldn’t be assumed security,…
Tektronix Communications signs a definitive agreement to buy network security provider Arbor Networks
Research in Motion has reportedly avoided a ban by agreeing to let the Saudi government monitor email data
Just one day before Microsoft releases its largest Patch Tuesday update, a new zero-day bug affecting Windows 7 and older…
Security company Absolute Software uses an FOI request to promote its services which include securing and tracing lost laptops
VeriSign is offering small businesses a dedicated online clinic to help give customers advice and assistance on trust and authentication…
Social networking sites such as Facebook are Twitter are costing the British economy billions of pounds a year in lost…
The recent 3.0 release brings together just about every security feature that could be offered via proxy in a straightforward…
The cars have been returned to service, minus their Wi-Fi antennas, following the 'WiSpy' privacy controversy that erupted in May
An out-of-cycle security patch will fix a critical bug discussed at the Black Hat security conference, among others