Twitter accounts held by notable individuals and organisations hacked and defaced with pro Turkish content
Cloud Expo 2017: Stuart Higgins, head of smart cities and IoT at Cisco champions smart building security from the get-go
IN DEPTH: The sharing of threat data is a key talking point within the world of cyber security, as we…
Luckily, the flaws were fixed before hackers were able to find and exploit them
The data was swiped form a server being operated by an external contractor
Check Point found malware lurking on mobiles form a major tech firm and a telecoms company
GCHQ warns that Russian tempering during US Presidential election is likely to happen again
ANALYSIS: Exposure of the CIA's hacking tools give an unsettling look at the capabilities of U.S. spies, but also a…
Organised crime study reveals that nearly all criminal gangs are now using some form of technology
The open-source WordPress blogging and content management system fixes six vulnerabilities, including three Cross Site Scripting flaws
Shamoon malware appears to have evolved into a browser-lurking cyber threat
A 50-member team of Google engineers voluntarily worked to patch 2,600 open-source projects against a Java deserialization bug in 2016
Spammergate: Researchers discover vast database of email addresses and suggestions of cybercrime against spam kings sending 1bn messages a day
Big data breach shows organisations of all sizes and sectors are open to the attentions of cyber criminals
The hidden IFrames cannot hurt Android devices but acts as a carrier for malicious code
Eugene Kaspersky says change is needed in order to defend against IoT security threats during theatrical appearance at MWC 2017
Yahoo regulatory filing reveals continued impacts of mass security failings
The malware also attempts to steal user credentials for the Chinese social network QQ
Firemon CTO Paul Calatayud explains why he calls it the Internet of Malicious Things and why virtualisation is the greatest…
Firm involved in the FBI's terrorist iPhone unlocking case admits it can now extract data from the iPhone 6 range
The police plan to extradite him to Germany where he could face up to ten years in prison
Mac attack. New ransomware campaign targets Apple Mac users seeking to pirate popular software
Now that's not nice. Virus seduces Android users into downloading fake Pornhub app and then demands ransom
Netflix says it wants to treat workers like people and educate them rather than restrict them on cybersecurity issues
Regulators say Microsoft is collecting too much information on Windows users without informing them how that data is being used
A researcher found he could continue to track, control and unlock his old car via its mobile app years after…
IN DEPTH: RSA 2017 and the call to arms for those tasked with keeping our online defences intact
RSA 2017: Why exactly are the cyber criminals currently coming out on top? Here are five reasons...
Hackers could unlock your car or start its ignition via car app flaws discovered by Kaspersky Lab researchers
Hackers, ransomware, and malicious code do not seem to be going anywhere in 2017