Police will now require independent authorisation to access data, but critics say the changes don't limit 'indiscriminate surveillance' of personal…
Departments handling sensitive data should avoid Russian security products as they face an 'increased risk' of hacking, while Barclays drops…
ANALYSIS: MPs admit to sharing passwords and leaving computers unlocked because of convenience, but the people deserve better
Supermarket Morrisons could be forced to pay compensation after rogue employee posted salary details online
NATO members to draw up rules and on how and when to deploy its cyber warfare capabilities
Top secret army data found online after virtual image of hard disk was left on an AWS server
Hackers are using increasingly sophisticated tools and techniques for attacks against banks, SWIFT warns
UPDATED: MacOS High Sierra has a serious flaw with admin privileges, as researcher criticised for public disclosure
A flaw in a new polling feature could have been manipulated by a malicious user to delete images of their…
McAfee's first major acquisition as an independent security firm is Skyhigh Networks
Blockchain could be used to give citizens control over how their identity information is shared with public services, argues the…
NHS Digital plots £20m division to help stop another WannaCry attack
The passwords were encrypted but may have been cracked using brute-force techniques, says Imgur's chief operating officer
A planned feature, currently in early testing, would alert users when they use a site that's recently been affected by…
ICO and NCSC are looking into the scale of the Uber hack before they take next steps
Is it legal? Hundreds of websites are said to be tracking visitor keystrokes raising questions of legality
Security experts are astounded at revelations that Uber concealed a cyberattack but what can businesses learn from it?
Business PCs from Dell, Lenovo, HP and others contain flawed software that shipped with Intel processors
New Uber CEO comes clean about 2016 hack, claiming data was destroyed and new measures implemented. But can users and…
Cisco is to contribute its world-spanning cyber-threat analysis to help battle increasingly sophisticated internet threats
ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can…
AWS re:Invent 2017: New government-focused region complements an existing deal that gives US intelligence agencies access to air-gapped cloud infrastructure
CA WORLD 2017: CA releases 20 new products and enhancements as it preaches the power of change through software
The banking Trojan, which imitates real banking apps to steal users' login details, has been reported on Google Play several…
The new Harvard programme is intended to put local and national election campaigns on guard against nation state hacking attacks
At the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software…
Big Blue and partners deliver Quad9 DNS privacy and security service for malicious website protection
ANALYSIS: North Korea’s activities have changed in a way that may indicate it is gathering the information it needs launch…
Hackers access personal information on old website but credit card details haven't been exposed, says Cash Converters
The consensus is that IoT is a security threat. But should we really be concerned?