Sky and BT email users on the Yahoo Mail platform are urged to reset their passwords following data breach
ANALYSIS: Integration with partners such as Cisco and centrally managed restrictions make iOS 10 a more secure enterprise platform, according…
macOS Sierra isn't just a pretty face. Apple has patched quite a few security flaws, including one that affects Docker
Researchers say Windows 10 Safe Mode flaw is easy to exploit but Microsoft doesn't acknowledge it as a primary threat
Sophos' CEO discusses the challenges and opportunities of being a publicly traded security company in 2016
More media server flaws surface as Google splits Android updates into three different patch levels. The update provides patches for…
A feature designed to make Linux-based networks harder to infiltrate has done the opposite. But can it really affect Tor?
'Linux.Lday.1' exploits unprotected Redis servers and infects PC with cryptocurrency mining software
FTC Commissioner Terrell McSweeny details how the government agency is working to improve privacy and limit deceptive practices online—and makes…
ANALYSIS: Bash support in Windows 10 Anniversary Update is valuable tool for developers, but needs to be used carefully because…
Variant of Zeus banking Trojan targets financial transactions in Brazil amid the backdrop of the Rio 2016 Olympic Games
RIO 2016: Olympic sports fans and organisations warned about dodgy apps and social media scams trying to steal data and…
BLACK HAT 2016: Experiment shows that most half of people will plug a randomly placed USB stick into their computer,…
BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run…
At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be…
PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security
INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why…
Ransomware will exploit server vulnerabilities, proliferate across networks and use encryption to hide itself, says Cisco report
ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the…
iOS 9.3.3 and Mac OS X 10.11.6 fix a range of vulnerabilities but none so important as a TIFF flaw…
After lying dormant for years, flaws in the HTTP Proxy header used in programming languages and applications, such as PHP,…
Cybercriminals will likely target Rio 2016 as researchers warn Olympic searches are already returning threats and federation websites compromised
University of Florida researchers say the answer to stopping ransomware is to let it onto your system first
Avast buys AVG for $1.3bn, giving it access to 400m PCs, smartphones, tablets and connected IoT devices
ANALYSIS: New zero-day vulnerability may also affect computers from other makers that used similar Intel UEFI reference code to create…
Apple will use differential privacy to collect data on groups while keeping individuals anonymous. This emphasises privacy, while giving access…
Safe Habour advice. British data protection act should be used when transferring data to US, says ICO
The suggestion is that Apple has negelected to encrypt iOS 10 kernel in bid to encourage hackers to find security…
INDUSTRY VIEW: Security experts examine parliamentary select committee's proposals for data breach compliance, enforcement and awareness
Discovery of serious Windows vulnerability, dubbed BadTunnel, earns researcher top bug bounty reward