Eugene Kaspersky says change is needed in order to defend against IoT security threats during theatrical appearance at MWC 2017
Firemon CTO Paul Calatayud explains why he calls it the Internet of Malicious Things and why virtualisation is the greatest…
Securitybot sends a Slack message to employees if unusual or potentially malicious activity is detected
Carbon Black believes now is the time to move on from traditional antivirus (AV) software and embrace the next generation…
Mac attack. New ransomware campaign targets Apple Mac users seeking to pirate popular software
A researcher found he could continue to track, control and unlock his old car via its mobile app years after…
Hackers could unlock your car or start its ignition via car app flaws discovered by Kaspersky Lab researchers
Have you been paying attention to Silicon's tech news? If yes, then put you knowledge to the test!
Hackers, ransomware, and malicious code do not seem to be going anywhere in 2017
Enterprise cloud security. Lock up your virtual network with 'industry first' terabit-level security gateway
Does it ever end? Yahoo issues fresh warning to users after disastrous data breach
INTERVIEW: Avast bought AVG for £1bn last year so it can gain access to 1 in 3 PCs around the…
The trojan used web injection to sneakily snatch credentials imputed into fake forms
The Cupertino company moved to squash another Garageband bug before it got exploted
The brand new Patch Tuesday will have to wait a bit longer for its debut because of a botched update
Georgia Tech researchers have created ransomware that can attack critical infrastructure
The US was the recipient of the majority of cyber spying
More Symantec products stuffed into BT's security services
Working with Bromium, HP Inc has created a tool that protects laptops from browser malware by using virtual machines
The Lazarus cyber criminal group appears to be behind a spate of custom malware attacks
WordPress rushed to fix the flaw but hackers speedily exploited the flaw
BAE survey says that unless there is more coordination between executives and IT departments, hackers will find holes to exploit
Security experts lambaste the retailers handling of the data breach
Trend Micro confirms a content spoofing vulnerability allowed fake articles onto its blog and says firms should respond honestly and…
ANALYSIS: Kaspersky Lab has discovered a new strain of malware that hides in memory and trusted applications while it stealthily…
Booz Allen contractor Harold Martin could be the next Edward Snowden
The flaw could allow hackers to conduct phishing attacks and spread malware
Google continues to fight new flaws found in its Android mobile operating system
A student has been sentenced to three years’ probation for selling malicious software that allowed cyber criminals to remotely control…
Scanning has revealed that popular apps could have their data intercepted by hackers