Prime Minister Scott Morrison reveals Australia is experiencing cyber attacks across 'a range of sectors', with China reportedly the likely…
Awake Security discover 'massive, criminal surveillance campaign' via 32 million downloads of extensions for Google's Chrome web browser
Eric Schmidt says Huawei does pose national security risk and has engaged in 'unacceptable acts', but the Chinese firm denies…
GitLab to integrate Peach Tech and Fuzzit fuzz-testing into its DevOps lifecycle tool, helping developers to catch security bugs earlier…
Study finds cyber-criminals are shifting tactics to favour multi-stage ransomware attacks that include stealing sensitive data to maximise damage and…
Strategic move? Google, Facebook, Microsoft pledge to improve and standardise annual disclosures around online child exploitation
Work at Honda factories in Japan, the UK, North America, Brazil, India, Turkey and Italy has been suspended after another…
Apple's open source Password Manager Resources project includes site-specific data aimed at improving compatibility of third-party password tools
We are tracking you. Apple warns looters after some street protests in the United States result in the looting of…
Confidential data from the US military contractor that supports the Minuteman III nuclear deterrent has been stolen by hackers
AppDynamics have launched a COVID-19 edition of its global research ‘The Agents of Transformation.’ The report includes data from interviews…
TrickBot information-stealing malware updated with new 'nworm' module that uses encryption and in-memory execution to hinder detection efforts
The COVID-19 crisis has seen an explosion in video and teleconferencing service use. Looking into the future, if more mass…
Fully updated Apple devices contain the exploit that allows the first public jailbreak for Apple's iOS operating system for nearly…
As businesses adapt to the 'new normal', a significant component of their organization will be virtual teams. Silicon UK discovers…
Researchers discover attack group that deploys highly targeted ransomware running inside virtualised Windows XP instance to evade detection
Security researchers find attackers breaking into public-facing Windows IIS web servers to install Monero-mining malware across networks
Company finds 20 percent of its all-remote staff responds to phishing message by exposing user credentials, raising fears about the…
Students and children at risk as more than 25 million account credentials allegedly stolen from Mathway offered for sale online
Scam emails use Excel spreadsheets containing Covid-19 data as a lure, then execute malicious macros that give attackers control over…
Distributed Ledger Technologies (DLT), Artificial Intelligence (AI), Extended Reality (XR) and Quantum Computing expand (DARQ), will be the next wave…
Three months after Firefox turned on privacy feature called DNS-over-HTTPS (DoH), Google's Chrome browser gets same feature, but only if…
Post COVID-19 could see many businesses permanently using home-based working as the norm for their enterprises. With annual reports stating…
No, not the JEDI contract. Google Cloud wins contract to help the US defense department detect and respond to cyber…
Security flaws in the NHS coronavirus contact-tracing app could pose risk to user privacy, as the NCSC promises to fix…
Beware the phishing scams warn experts, as the hack of easyJet make available more valuable personal information on the dark…
Personal information of 9 million customers accessed in a “highly sophisticated” cyber-attack, which saw the credit card details of 2,200…
Agency says it had to develop its own tool to access two locked iPhones used by gunman who attacked Pensacola…
Researchers warn of weaknesses affecting all Bluetooth-compliant devices – just as governments roll out coronavirus apps reliant on the tech
Hackers break into academic high-performance computing clusters in Edinburgh, Germany and Switzerland to install Monero currency-mining software