Android's built-in protection which flags warnings about apps trying to send premium rate messages without user consent can be manipulated…
A Cambridge computer scientist claims has achieved an iPhone 5C hack the FBI struggled to do with $1 million
Researchers say Windows 10 Safe Mode flaw is easy to exploit but Microsoft doesn't acknowledge it as a primary threat
Sophos' CEO discusses the challenges and opportunities of being a publicly traded security company in 2016
Google will warn Chrome users away from insecure HTTP websites
Government Digital Service will continue to push is government-as-a-platform plans beyond Whitehall but cloud challenges await
More media server flaws surface as Google splits Android updates into three different patch levels. The update provides patches for…
F-Secure has discovered a critical flaw in the way some Inteno routers update their firmware leaving them vulnerable to malware
A feature designed to make Linux-based networks harder to infiltrate has done the opposite. But can it really affect Tor?
'Linux.Lday.1' exploits unprotected Redis servers and infects PC with cryptocurrency mining software
FTC Commissioner Terrell McSweeny details how the government agency is working to improve privacy and limit deceptive practices online—and makes…
ANALYSIS: Bash support in Windows 10 Anniversary Update is valuable tool for developers, but needs to be used carefully because…
Variant of Zeus banking Trojan targets financial transactions in Brazil amid the backdrop of the Rio 2016 Olympic Games
RIO 2016: Olympic sports fans and organisations warned about dodgy apps and social media scams trying to steal data and…
BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run…
At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be…
Google's CSEK moves into GA, meaning all customers can now bring their own encryption keys for Compute Engine
PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security
INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why…
Ransomware will exploit server vulnerabilities, proliferate across networks and use encryption to hide itself, says Cisco report
ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the…
iOS 9.3.3 and Mac OS X 10.11.6 fix a range of vulnerabilities but none so important as a TIFF flaw…
After lying dormant for years, flaws in the HTTP Proxy header used in programming languages and applications, such as PHP,…
Cybercriminals will likely target Rio 2016 as researchers warn Olympic searches are already returning threats and federation websites compromised
Majority of people want to use biometrics when making payments, with fingerprints the favoured option
University of Florida researchers say the answer to stopping ransomware is to let it onto your system first
Avast buys AVG for $1.3bn, giving it access to 400m PCs, smartphones, tablets and connected IoT devices
ANALYSIS: New zero-day vulnerability may also affect computers from other makers that used similar Intel UEFI reference code to create…
Apple will use differential privacy to collect data on groups while keeping individuals anonymous. This emphasises privacy, while giving access…
Safe Habour advice. British data protection act should be used when transferring data to US, says ICO