The Imeij malware exploits a bug in AVTech video surveillance equipment first disclosed last year, but never patched by the Taiwanese vendor

The Imeij malware exploits a bug in AVTech video surveillance equipment first disclosed last year, but never patched by the Taiwanese vendor
The data was swiped form a server being operated by an external contractor
Check Point found malware lurking on mobiles form a major tech firm and a telecoms company
The move is aimed at tightening security, but users slated the ISP for giving them no warning
GCHQ warns that Russian tempering during US Presidential election is likely to happen again
ANALYSIS: Exposure of the CIA's hacking tools give an unsettling look at the capabilities of U.S. spies, but also a clear view of your vulnerabilities
The whistleblowing site will publish 'additional documents' after fixes have been pushed out to citizens
Organised crime study reveals that nearly all criminal gangs are now using some form of technology
The open-source WordPress blogging and content management system fixes six vulnerabilities, including three Cross Site Scripting flaws
Watching TV but who is watching you? CIA allegedly uses Samsung TVs to spy on citizens
Amazon has provided prosecutors access to Echo recordings in the latest case to raise questions on the privacy implications of the 'Internet of Things'
Shamoon malware appears to have evolved into a browser-lurking cyber threat
Scammers reportedly operating at least three call centres in two Indian cities targeting TalkTalk customers
A 50-member team of Google engineers voluntarily worked to patch 2,600 open-source projects against a Java deserialization bug in 2016
Spammergate: Researchers discover vast database of email addresses and suggestions of cybercrime against spam kings sending 1bn messages a day
The information commissioner is to investigate whether citizens' data was used illegally by the Leave.eu campaign ahead of the Brexit vote
Big data breach shows organisations of all sizes and sectors are open to the attentions of cyber criminals
Industrial sabotage was voted more likely than attacks by cyber criminals, disgruntled employees and political conspiracy
The hidden IFrames cannot hurt Android devices but acts as a carrier for malicious code
The security credentials of Password Managers on Android called into question after discovery of multiple flaws
Eugene Kaspersky says change is needed in order to defend against IoT security threats during theatrical appearance at MWC 2017
Researcher has great fun using one of Google's services to bypass another Google service
Yahoo regulatory filing reveals continued impacts of mass security failings
The malware also attempts to steal user credentials for the Chinese social network QQ
The CloudPets user database was stored unprotected online, and weak passwords meant hackers could access stored children's messages
The heist, which officials suggested may have been carried out by a nation-state, extracted only basic data on 850 government users
Google Zero's latest unpatched bug is ranked 'critical' and could be used to target Windows 10 Edge and Internet Explorer 11
The first face-to-face round of this year's Cyber Security Challenge UK highlights the risk of insecure IoT connected devices
Firemon CTO Paul Calatayud explains why he calls it the Internet of Malicious Things and why virtualisation is the greatest tech ever created
The NHS has admitted thousands of patients may have been affected by the loss of records that went undelivered over a period of five years