"ShadowBrokers" releases 61 files said to contain exploit tools used by the NSA, which could fuel a race between attackers…
UPDATED: Researcher says WhatsApp can reissue encryption keys for offline devices, compromising privacy. WhatsApp says there is no backdoor and…
Former major of New York Giuliani accepts position as leader of Donald Trump's new cybersecurity team
Switzerland's Privacy Shield data transfer agreement with the US is similar to the EU, aiding multinationals and offering potential Brexit…
Individual states will still have oversight and control over their election systems, but the move makes a statement “domestically and…
AVG 2017 not has access to Avast's CyberCapture tool for real-time threat detection
ANALYSIS: Despite claims about advanced security, the FTC says D-Link hard-coded login credentials leaving encryption keys unprotected and publicly exposed
Google starts the new year with another large security update for Android, once again patching mediaserver, Qualcomm and Linux kernel…
CES 2017: Lock it down. Security players tout offerings to secure smart homes of the future
ANALYSIS: Constant bad news about Russian hacking and the increasing prevalence of ransomware made 2016 an IT security disaster... but…
IOactive finds security flaws in Panasonic's Avionic In-Flight Entertainment (IFE) system that could potentially give an attacker unauthorised access
Another major data breach could torpedo Yahoo’s acquisition by Verizon
INTERVIEW: MobileIron CEO Barry Mainz tells Silicon about PC management, the rise of IoT and why it is better equipped…
Hackers can exploit a command injection flaw to execute malicious code on Netgear routers
The Mirai botnet has spread like wildfire and now infects 2,398 home routers across the UK, with 99 percent of…
40 organisations are now part of the effort to train Watson for Cyber Security in an effort to improve security…
ANALYSIS: With the possibility that fake news may have impacted the US election, people are giving a new look to…
ANALYSIS: The rules of traditional warfare don't apply in cyber war, even to the point where it's hard to tell…
Mirai botnet strikes again, attacking routers and cutting-off broadband
National Lottery and experts suggest accounts breached by reusing compromised credentials
ANALYSIS: You’re not paranoid. Cyber-criminals really are after your company’s money and its data and they won’t stop at anything…
ANALYSIS: Despite the suspicions a group of computer scientists, a recount of close presidential election tallies in three states won't…
ANALYSIS: Encryption keys are wonderful things that allow your organisation to conduct secure communications without issue- as long as you…
The security giant looks to turn its ailing consumer security software division
ISPs set to be required to keep your internet search history on record for at least a year in order…
Law enforcement could get their hands on call data if it is sent to iCloud for 'no reason', claims Russian…
DocuSign continues European expansion with cybersecurity investment in the Irish capital
Smart lighting may be the next Internet of Things (IoT) attack vector, thanks to hackable Philips Hue smart lightbulbs.
The scope of knowledge Yahoo's staff had of the 2014 data breach is also under scrutiny
INTERVIEW: Splunk's security evangelist Matthias Maier talk bolstering cyber defences with machine data