The platform, including Blackphone 2 and Blackphone+, is said to address the failures of traditional security solutions
American student tests his cyberskills with hack of high school network to bolster exam results
Cybercriminals using phishing techniques to exploit router vulnerabilities, including weak passwords
Bitdefender warns that the mobile adware resembles that found on PCs, delivering a barrage of ads
Euro cops shut down botnet that infected 3.2 million computers in order to steal banking information
Lenovo's main corporate website compromised in apparent revenge for Superfish adware
Nexusguard's 2015 Internet Security Trend report reveals DDoS assaults on the Internet of Things will cost businesses millions of pounds
Cyber Streetwise report finds many SMBs don’t know where to start to protect their business
John Green, business and technology development director at IT security firm Accumuli, advises on how to get tough on cyber…
LinkedIn pays nearly £1m to settle legal fight after security breach compromised 6.5 million user passwords
Russian hacker behind the Gameover Zeus botnet is hit with world's largest ever reward for his arrest
Gemalto's 'thorough investigation' concludes GCHQ and the NSA was probably behind 'sophisticated intrusion'
Data of 10,000 drivers leaked online after PaymyPCN.net database security gaff
Hackers increasingly went mobile last year, with Point of Sale terminals also key targets, Trend Micro report reveals
Study by Ping Identity shows half of consumers use the same password across multiple websites
Symantec report finds we trust hospitals and banks with our data, but not retailers or social media sites
The definitive definition of phishing (not fishing) from the experts for the kids (and adults, too)
44 percent of breaches in 2014 were caused by known vulnerabilities between two and four years old, report finds
Avast for Business is said to bring straightforward, cross-platform and cloud-managed security to the market
Kurt Mueffelmann, CEO at IT security firm Cryptzone, explains how you can optimise Payment Card Industry Data Security Standard compliance…
Gary Newe, systems engineer, F5 Networks, recommends taking 10 decisive actions when you come under DDoS attack
What can Lenovo's customers do about its sneaky adware, and how will Superfish impact the company's brand reputation?
TechWeekEurope gets the expert’s views on RBS and NatWest’s plans for fingerprint scanning logins
The NSA backs FBI conclusion that North Korea was responsible for the damaging hack of Sony Pictures
Google warns US government it will fight proposals to allow “remote access” to every computer and device
Company is readying more ways of securing data while its productivity software platform makes itself at home on smartphones and…
Low predictability of cyber-attacks increases risk for all 11 industries surveyed in new study
Shady website offers an anonymous marketplace for potential whistleblowers ...and blackmailers
A drizzle of malware, a dash of exploit and a dollop of malicious code were the recipe for Jamie Oliver's…
That's not so pukka then, as Jamie Oliver's website falls victim to cyber hackers