Hackers can use the decade-old tool to execute stealthy cyber attacks
The malware offers a free decryption key if the victim forces to others to pay up
The review is to examine government-sponsored hacks going back to 2008
Hackers can exploit a command injection flaw to execute malicious code on Netgear routers
Hackers have looted sensitive trade secrets from a German conglomerate in latest damaging data breach
Yahoo moved to patch the flaw before the bug could cause chaos
Called BlackBerry Secure, the platform aims to help businesses manage their mobile and connected devices and provide secure communications.
Experts discuss safeguarding against drones that pose increasing threats to prisons, airports and public safety
Ransomware attacks developed significantly in 2016, both in prevalence and sophistication, making it the threat of the year for businesses…
NHS Trusts have been caught running thousands of outdated and unsupported Windows XP machines, despite a developing threat landscape and…
Rise of the botnets levies threats at businesses and governments
Nintendo has launched a bug bounty programme, offering rewards of up to $20,000 for vulnerabilities around its 3DS family of…
The Mirai botnet has spread like wildfire and now infects 2,398 home routers across the UK, with 99 percent of…
ICO fines RSPCA and British Heart Foundation for "wealth screening" to get more donations
More than 85 million usernames and email addresses have been stolen by unrevealed hackers
40 organisations are now part of the effort to train Watson for Cyber Security in an effort to improve security…
The funding is to support a cloud data-access programme, DNA database, data analytics lab and other schemes
Security researchers have added more than 115 million malware samples to their databases so far this year, with Windows viruses…
ANALYSIS: With the possibility that fake news may have impacted the US election, people are giving a new look to…
"I'd rather be associated with being hacked by some porn site," says one unhappy football fan
Federal study calls for efforts on government-sponsored hacking and insecure Internet-connected devices
Visa's online payment system fails to pick up on multiple invalid credit card attempts across multiple websites
Laptops, smartphones, gaming consoles and in-car displays are amongst the systems vulnerable to the USB-based electrical shock attack
ANALYSIS: The rules of traditional warfare don't apply in cyber war, even to the point where it's hard to tell…
How to get around the problem of a locked smartphone? Just ambush the criminal when he is using it. Simples
Amazon introduces AWS Shield managed service to protect against crippling DDoS attacks
Mirai botnet strikes again, attacking routers and cutting-off broadband
Red faces at Euro cops after sensitive terror data is found online by Dutch TV programme
Android malware has compromised more than one million Google accounts, warns Check Point
ICO begins investigation after Camelot detected 'suspicious activity' on player online accounts earlier this week