Apple's open source Password Manager Resources project includes site-specific data aimed at improving compatibility of third-party password tools
We are tracking you. Apple warns looters after some street protests in the United States result in the looting of…
Confidential data from the US military contractor that supports the Minuteman III nuclear deterrent has been stolen by hackers
AppDynamics have launched a COVID-19 edition of its global research ‘The Agents of Transformation.’ The report includes data from interviews…
TrickBot information-stealing malware updated with new 'nworm' module that uses encryption and in-memory execution to hinder detection efforts
The COVID-19 crisis has seen an explosion in video and teleconferencing service use. Looking into the future, if more mass…
Fully updated Apple devices contain the exploit that allows the first public jailbreak for Apple's iOS operating system for nearly…
As businesses adapt to the 'new normal', a significant component of their organization will be virtual teams. Silicon UK discovers…
Researchers discover attack group that deploys highly targeted ransomware running inside virtualised Windows XP instance to evade detection
Security researchers find attackers breaking into public-facing Windows IIS web servers to install Monero-mining malware across networks
Company finds 20 percent of its all-remote staff responds to phishing message by exposing user credentials, raising fears about the…
Students and children at risk as more than 25 million account credentials allegedly stolen from Mathway offered for sale online
Scam emails use Excel spreadsheets containing Covid-19 data as a lure, then execute malicious macros that give attackers control over…
Distributed Ledger Technologies (DLT), Artificial Intelligence (AI), Extended Reality (XR) and Quantum Computing expand (DARQ), will be the next wave…
Three months after Firefox turned on privacy feature called DNS-over-HTTPS (DoH), Google's Chrome browser gets same feature, but only if…
Post COVID-19 could see many businesses permanently using home-based working as the norm for their enterprises. With annual reports stating…
No, not the JEDI contract. Google Cloud wins contract to help the US defense department detect and respond to cyber…
Security flaws in the NHS coronavirus contact-tracing app could pose risk to user privacy, as the NCSC promises to fix…
Beware the phishing scams warn experts, as the hack of easyJet make available more valuable personal information on the dark…
Personal information of 9 million customers accessed in a “highly sophisticated” cyber-attack, which saw the credit card details of 2,200…
Agency says it had to develop its own tool to access two locked iPhones used by gunman who attacked Pensacola…
Researchers warn of weaknesses affecting all Bluetooth-compliant devices – just as governments roll out coronavirus apps reliant on the tech
Hackers break into academic high-performance computing clusters in Edinburgh, Germany and Switzerland to install Monero currency-mining software
Hackers demand $42m from New York law firm that represents Lady Gaga, U2, Jessica Simpson and others – and promises…
Malware found on Google Play looks innocent at first, then downloads additional capabilities that allow it to take over targeted…
German Chancellor Angela Merkel confirmed she was targeted by hackers, linked to Russia's military intelligence (GRU) agency
The FBI and Department of Homeland Security say China-linked hackers are attacking US firms carrying out Covid-19 research
If a hacker gains physical access to your computer, the Thunderbolt port could be exploited to access the hard disc…
Personal information and contracts belonging to celebrities including Lady Gaga, Madonna, and Elton John have been stolen by hackers
Final encrypted message sent by Nazi military unit in the final days of the Second War World in Europe has…