Daniel Cohen, head of FraudAction at RSA - a security division of EMC - explains how cybercriminals have upped their…
Researchers detail how DROWN can be used to decrypt communications on HTTPS-secure websites and urge server operators to update now
BLOG: Kurt Stammberger, founder of the RSA Conference, sees the same issues in FBI vs. Apple as were brought to…
Research shows more malvertising assaults are using 'fingerprinting' at an advert level to avoid unncessary attention and save bandwidth
Microsoft says new capabilities for its cloud services are part of a new vision of security outlined by Satya Nadella…
Apple is fighting a very public battle with the FBI over encryption. But should the industry do more? Let us…
Attackers manage to breach Linux Mint's security, adding a backdoor to the distribution and even stealing information from user forums.
Cisco says its threat-focused next generation firewalls will help firms simplify their security and prevent overcomplication
Shut that door, as Cisco issues a vulnerability alert that affects its front-line defensive firewalls
It's time to end your relationships with cybercriminals who lie, cheat and steal. You can do so much better
Get your head around these IT security terms and you're well on your way to protecting your company, says Laurance…
Flaw in eBay custom descriptions could allow for the execution of malicious JavaScript, but no fix appears to be on…
US congressional probe to investigate who placed the backdoor code into Juniper's firewall software
Oracle admits time is running out for browser plugins and suggests Java developers migrate to another platform
The issue of privacy has never been in the spotlight as much as it is now, but what do you…
Government hopes advice and cybersecurity support will help startups flourish, gain investment and protect the UK from an attack
Like a recent New York State bill, the law seeks to ban the sale of mobile devices that can't be…
Researchers find a member of Symantec's partner program was offering bogus tech support and overpriced software to web users
Linux.Ekoms.1 takes a screenshot every 30 seconds but audio capture function remains dormant for now
Security researcher devises method of stealing LastPass login details using browser notifications and API
More malicious apps masquerading as games are found on Google Play
Dodgy ads install CryptoWall ransomware on PCs with out of date Flash plug-ins in latest malvertising attack
Google fixes 12 Android vulnerabilities for Nexus smartphones and tablets, including a severe media related remote code execution flaw
Cisco says voluntary review is to reassure customers and says it has no indication of unauthorised code in its equipment
BlackBerry chief John Chen says technology and governments should work together, claiming privacy would not be the victim of cooperation
Controversial security app MacKeeper says no payment details stolen and flaw is fixed
Nearly half of companies hit by DDoS attacks believe their competitors are responsible
Security researchers warn that even the most popular sites are targets for malvertising assaults
Crackdown on insecure and unsecured networks follows Paris terrorist attacks last month
Researchers detect a new Flash malvertising campaign targeting users of several "moderately" popular adult portals