Twitter suspends 360,000 accounts for 'promotion of terrorism', but warns there is no magic algorithm to ID suspects
Just days after damaging data breach at Sage, police confirm arrest of staffer at Heathrow airport
A feature designed to make Linux-based networks harder to infiltrate has done the opposite. But can it really affect Tor?
Keeping it open source baby. Tor Social Contract promises no backdoors and complete honesty with its users
'Linux.Lday.1' exploits unprotected Redis servers and infects PC with cryptocurrency mining software
Symantec warns of Instagram profile hack that uses compromised accounts to promote adult dating websites
FTC Commissioner Terrell McSweeny details how the government agency is working to improve privacy and limit deceptive practices online—and makes…
ANALYSIS: Bash support in Windows 10 Anniversary Update is valuable tool for developers, but needs to be used carefully because…
Variant of Zeus banking Trojan targets financial transactions in Brazil amid the backdrop of the Rio 2016 Olympic Games
Crippling threat...20 percent of firms hit by ransomware had to cease business operations
RIO 2016: Olympic sports fans and organisations warned about dodgy apps and social media scams trying to steal data and…
BLACK HAT 2016: Experiment shows that most half of people will plug a randomly placed USB stick into their computer,…
BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run…
BLACK HAT 2016: Rapid7 researchers discover how hackers can steal account details from an ATM by bypassing anti-shimming measures
Digital currency rocked by another Bitcoin theft, but Bitfinex cannot confirm whether it was insider job or hack
Protocol problems...the new version of the HTTP (HTTP/2) has four “high profile” flaws, researchers caution
Claims to be first time a security vendor has offered rewards for disclosures of vulnerabilities with its products
At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be…
PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security
INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why…
AdGholas malvertising campaign closes after pulling in at least a million victim computers a day
Hackers use Google Drive to host malicious files that seems to be targeting a number of Asian countries
Keystrokes from wireless keyboards transmit with no encryption and can be intercepted from hundreds of feet away
Ransomware will exploit server vulnerabilities, proliferate across networks and use encryption to hide itself, says Cisco report
ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the…
Office for National Statistic report shows that one in ten people are victims of fraud or cybercrime
iOS 9.3.3 and Mac OS X 10.11.6 fix a range of vulnerabilities but none so important as a TIFF flaw…
After lying dormant for years, flaws in the HTTP Proxy header used in programming languages and applications, such as PHP,…
Fresh concern raised about the security of the very products designed to protect users from cyber nastiness
Cybercriminals will likely target Rio 2016 as researchers warn Olympic searches are already returning threats and federation websites compromised