Yahoo moved to patch the flaw before the bug could cause chaos
Called BlackBerry Secure, the platform aims to help businesses manage their mobile and connected devices and provide secure communications.
Experts discuss safeguarding against drones that pose increasing threats to prisons, airports and public safety
Ransomware attacks developed significantly in 2016, both in prevalence and sophistication, making it the threat of the year for businesses…
NHS Trusts have been caught running thousands of outdated and unsupported Windows XP machines, despite a developing threat landscape and…
Rise of the botnets levies threats at businesses and governments
Nintendo has launched a bug bounty programme, offering rewards of up to $20,000 for vulnerabilities around its 3DS family of…
The Mirai botnet has spread like wildfire and now infects 2,398 home routers across the UK, with 99 percent of…
ICO fines RSPCA and British Heart Foundation for "wealth screening" to get more donations
More than 85 million usernames and email addresses have been stolen by unrevealed hackers
40 organisations are now part of the effort to train Watson for Cyber Security in an effort to improve security…
The funding is to support a cloud data-access programme, DNA database, data analytics lab and other schemes
Security researchers have added more than 115 million malware samples to their databases so far this year, with Windows viruses…
ANALYSIS: With the possibility that fake news may have impacted the US election, people are giving a new look to…
"I'd rather be associated with being hacked by some porn site," says one unhappy football fan
Federal study calls for efforts on government-sponsored hacking and insecure Internet-connected devices
Visa's online payment system fails to pick up on multiple invalid credit card attempts across multiple websites
Laptops, smartphones, gaming consoles and in-car displays are amongst the systems vulnerable to the USB-based electrical shock attack
ANALYSIS: The rules of traditional warfare don't apply in cyber war, even to the point where it's hard to tell…
How to get around the problem of a locked smartphone? Just ambush the criminal when he is using it. Simples
Amazon introduces AWS Shield managed service to protect against crippling DDoS attacks
Mirai botnet strikes again, attacking routers and cutting-off broadband
Red faces at Euro cops after sensitive terror data is found online by Dutch TV programme
Android malware has compromised more than one million Google accounts, warns Check Point
ICO begins investigation after Camelot detected 'suspicious activity' on player online accounts earlier this week
National Lottery and experts suggest accounts breached by reusing compromised credentials
Court documents reveal US investigators hacked thousands of suspects' computers around the world
ANALYSIS: You’re not paranoid. Cyber-criminals really are after your company’s money and its data and they won’t stop at anything…
The petition is to be considered for parliamentary debate after receiving more than 130,000 signatures
Attackers can record sound from hacked systems, even when microphones are muted, switched off or unplugged, finds a study