WordPress rushed to fix the flaw but hackers speedily exploited the flaw
BAE survey says that unless there is more coordination between executives and IT departments, hackers will find holes to exploit
Trend Micro confirms a content spoofing vulnerability allowed fake articles onto its blog and says firms should respond honestly and…
ANALYSIS: Kaspersky Lab has discovered a new strain of malware that hides in memory and trusted applications while it stealthily…
Booz Allen contractor Harold Martin could be the next Edward Snowden
The flaw could allow hackers to conduct phishing attacks and spread malware
Scanning has revealed that popular apps could have their data intercepted by hackers
Startup emerges from stealth with new funding and the promise of improving threat detection by automating activities that typically require…
Up to 31 Netgear rotuers impacted by remote access flaw that could leave your network a node in a botnet
We're all internet users, so we all must know how to spot fake apps and how to keep our own…
Google takes another step towards driving the adoption of HTTPS
Google aims to lock down security with its web services
Unsecured websites will display a lock with a red strike through it
Two dangerous kernel bugs highlighted by Google's Project Zero have been squashed
Meitu has exploded in popularity but beware of the data demands it makes
Another iMessage bug has been found, affecting most versions of iOS
Shoddy password practices leave the door open for hackers to take away customer details
Patch Tuesday is changing: From February, Microsoft will communicate security updates via a dynamic online portal rather than a static…
"ShadowBrokers" releases 61 files said to contain exploit tools used by the NSA, which could fuel a race between attackers…
UPDATED: Researcher says WhatsApp can reissue encryption keys for offline devices, compromising privacy. WhatsApp says there is no backdoor and…
Former major of New York Giuliani accepts position as leader of Donald Trump's new cybersecurity team
Switzerland's Privacy Shield data transfer agreement with the US is similar to the EU, aiding multinationals and offering potential Brexit…
The Ethics and Governance of Artificial Intelligence Fund will explore the development of AI from a non-technical viewpoint
Individual states will still have oversight and control over their election systems, but the move makes a statement “domestically and…
ANALYSIS: Despite claims about advanced security, the FTC says D-Link hard-coded login credentials leaving encryption keys unprotected and publicly exposed
Google starts the new year with another large security update for Android, once again patching mediaserver, Qualcomm and Linux kernel…
CES 2017: Lock it down. Security players tout offerings to secure smart homes of the future
ANALYSIS: Constant bad news about Russian hacking and the increasing prevalence of ransomware made 2016 an IT security disaster... but…
IOactive finds security flaws in Panasonic's Avionic In-Flight Entertainment (IFE) system that could potentially give an attacker unauthorised access
Bot hunting tech will be added to Akamai's existing online security software