ICO and NCSC are looking into the scale of the Uber hack before they take next steps
Is it legal? Hundreds of websites are said to be tracking visitor keystrokes raising questions of legality
Security experts are astounded at revelations that Uber concealed a cyberattack but what can businesses learn from it?
Business PCs from Dell, Lenovo, HP and others contain flawed software that shipped with Intel processors
New Uber CEO comes clean about 2016 hack, claiming data was destroyed and new measures implemented. But can users and…
ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can…
CA WORLD 2017: CA releases 20 new products and enhancements as it preaches the power of change through software
At the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software…
Big Blue and partners deliver Quad9 DNS privacy and security service for malicious website protection
ANALYSIS: North Korea’s activities have changed in a way that may indicate it is gathering the information it needs launch…
Hackers access personal information on old website but credit card details haven't been exposed, says Cash Converters
Kaspersky publishes investigation findings that it says show its products were not used to stage assault which saw NSA code…
At the SecTor security conference, an MIT futurist details an open-source effort that aims to restore trust and improve data…
Not again. Google Play found to host malicious Android apps that seem legitimate, but install a mobile banking trojan
No zero-day vulnerabilities this month, but still a moderate number of patches from Microsoft
New banking Trojan discovered and is active in the wild hitting targets in the United States and the UK
Vietnamese security firm Bkav says its proof of concept shows face ID isn't secure
Confidential KPMG documents accessed because of security flaw with sign in process
Not again...sensitive health data on university staff member emailed to hundreds of students
ThreatConnect's director of research discusses her career in IT and her investigations in to some of the most notable hacks…
Many enterprises are complacent about IoT security according to new Forrester research, and most lack device visibility
Previously unknown hacking group found targeting foreign policy and diplomatic targets
ICO prioritises reducing 'trust deficit' head of GDPR next year
Financial institutions facing targetted threat from Silence trojan which infiltrates internal banking networks
The personal details of tens of thousands of Australian government and banking staff exposed in latest breach
ANALYSIS: Experts on international terrorism turn from describing how terrorists use social media to reporting the level of chatter on…
The nation dismisses Britain's security minister's claims as "groundless speculation"
Two weeks after a major WiFi security vulnerability was publicly disclosed and patched by other vendors, Apple provides its mobile…
Discovery of bug in Google's bug tracking database lands researcher $15,600 in bug bounties
North Korea is yet again the suspected culprit behind WannaCry