Claims to be first time a security vendor has offered rewards for disclosures of vulnerabilities with its products

Claims to be first time a security vendor has offered rewards for disclosures of vulnerabilities with its products
Tripwire research finds Ruckus routers are susceptible to intruders
At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be at risk
Google's CSEK moves into GA, meaning all customers can now bring their own encryption keys for Compute Engine
Battery Status API in HTML5 is being used to track user activity, warn security researchers
PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security
Yahoo said it is investigating reports that 200 million users' data is being sold online
GhostMail said it doesn't want its encrypted email service used by 'the wrong people'
The Citibank employee admitted to intentionally taking down 90 percent of the company's network across North America
INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why firms should trust telcos
Deleted WhatsApp messages could be easy to recover, with unencrypted copies stored on iCloud, a researcher finds
SwiftKey users reported seeing other users' email addresses and autocorrect suggestions, prompting SwiftKey to shut down its cloud sync service
AdGholas malvertising campaign closes after pulling in at least a million victim computers a day
ANALYSIS: Recent FCC pressure is resulting in some movement by carriers to try to quell robocalls, but much needs to be done before anyone sees any real relief
ANALYSIS: One year after the Stagefright Android flaw was first reported, its effects are widespread. More than 100 related flaws have emerged and hundreds of millions of users remain at risk
Hackers use Google Drive to host malicious files that seems to be targeting a number of Asian countries
Keystrokes from wireless keyboards transmit with no encryption and can be intercepted from hundreds of feet away
Ransomware will exploit server vulnerabilities, proliferate across networks and use encryption to hide itself, says Cisco report
No More Ransom offers decryption keys to encourage ransomware victims not to pay
Details were reportedly stolen using credentials leaked from a gaming site three years ago
ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the data breach might have been much worse
The attack provided complete access to Pornhub's database and exposed two PHP flaws
Good Dynamics Secure Mobility Platform now available in Microsoft Azure Marketplace
Threat of cyberattacks prompt Estonian officials to investigate possibility of using UK data centres for citizen data
Office for National Statistic report shows that one in ten people are victims of fraud or cybercrime
iOS 9.3.3 and Mac OS X 10.11.6 fix a range of vulnerabilities but none so important as a TIFF flaw that affects all versions
After lying dormant for years, flaws in the HTTP Proxy header used in programming languages and applications, such as PHP, Go and Python, have now been fixed
Oracle's July Critical Patch update fixes 276 different vulnerabilities. Will 200-plus flaws be typical for future updates?
BlackBerry says businesses need better mobile security and agrees software deals with US government and coastguard
Fresh concern raised about the security of the very products designed to protect users from cyber nastiness