VIDEO: ESET’s Mark James tells us how to best protect from particularly painful malware
Apple will use differential privacy to collect data on groups while keeping individuals anonymous. This emphasises privacy, while giving access…
Don't fall for it. Devious malware utilises user interfaces of Android apps in order to steal sensitive data
Vulnerabilities “are as bad as it gets” says Google's Project Zero, and could endanger millions of users
The use of machine learning to identify suspicious online activity is a new and important capability in securing the network,…
Malwarebytes becomes sponsor of NASCAR team after its testing data was encrypted by ransomware
Fresh privacy concern? US Customs proposes to screen social media profiles of travellers to the United States
But Microsoft insists that only a small number of Office 365 were targetted and the attack was blocked within hours
Safe Habour advice. British data protection act should be used when transferring data to US, says ICO
But Intel Security’s Gordon Morrison says that a growing skills gap could be a worry
Flash not so bad? New report casts doubts on HTML5 adverts being safer than Adobe Flash
Patch it now! Popular open source file compression tool libarchive contains wide reaching vulnerabilities
Intel Security says employees are not being educated about the risks of adding people they don't know on LinkedIn amid…
The suggestion is that Apple has negelected to encrypt iOS 10 kernel in bid to encourage hackers to find security…
INDUSTRY VIEW: Security experts examine parliamentary select committee's proposals for data breach compliance, enforcement and awareness
Discovery of serious Windows vulnerability, dubbed BadTunnel, earns researcher top bug bounty reward
Sophos researcher tells us why flaws in the toys of today could cause major security worries in the future
More co-operation between industry and government is also needed to tackle growing threats, Trend Micro VP tells TechWeekEurope
Fallout from LinkedIn breach seems to continue as GitHub admits some accounts were accessed by attacker
Fancy a DDoS attack? Cybercrime marketplace offers access to compromised third party servers for just £4.23
Fixes for Edge and Internet Explorer, but admins warned to pay attention to serious Adobe Flash zero day
Democrat computer hacked by Russian intelligence agencies and lifted opposition data on 'The Donald'
Malware, social engineering and dodgy ticket sites. Here are the security threats you should be looking out for during Euro…
Attackers utilise social engineering to lure MS Word users to enable macros in order to avoid cyber detection
Undergound data breach. Up to 35,000 user accounts on the uTorrent community forums exposed after hack
More than 32m user passwords appear online, but Twitter claims no breach occurred
Blue Coat research shows significant amounts of cloud use in firms is not sanctioned
Nine tenths of UK organisations feel vulnerable to cyber threats – where should your priorities lie?
ANALYSIS: Facebook founder and CEO Mark Zuckerberg made a mistake that many, perhaps most, people make and reused passwords for…
Dr Web researchers find new malware that can spread itself and avoid detection on Windows systems