The end of traditional biometric and password security? US Military signs deal for new ID verification system
Critical vulnerability found in Linux systems gives attackers control without system credentials
Smartphone users need to be aware of what data their mobile apps have access to, say Silent Circle and Blackphone
"Hackers gonna hack hack hack hack hack", it seems, as Taylor Swift's Twitter account not able to “shake it off”…
With today being Data Privacy Day, the identity and data protection specialist at digital security firm Gemalto explains how you…
How much do you trust your employees with the passwords to important documents?
Facebook, Instagram and Tinder were all affected by the outage, which left millions across the world unable to access the…
Google research team reveals three serious Mac OS flaws, after Apple fails to respond with fixes
Fugitive millionaire delivers on promise of encrypted rival to Skype to stop government snoops
Sony issues blanket apology ahead of more embarrassing leaks from 'Guardians of Peace' (GoP) hackers
UK Internet giant blocks porn by default to protect children, but IT security firms warn the move could create a…
In a continuing effort to secure hundreds of millions of users, WordPress.com is disconnecting self-hosted sites that haven't updated the…
Less than half of firms regularly take basic measures like installing patches and updating software, Cisco research finds
WhatsApp Web launches for desktop users, but not for iOS users due to “Apple platform limitations”
Hacking is so easy, even a seven year-old girl can do it, experiment finds
'123456' and 'password' top SplashData list of the world’s worst passwords
Security flaw puts users of apps including Tinder, Grindr, Angry Birds, Starbucks and Whisper in danger
The definitive definition of ransomware from the experts for the kids (and adults, too)
VLC says 'non-exploitable' flaws in VLC 2.1.5 have been fixed
GreatFire.org points finger at Cyberspace Administration of China
The hackers' high level of skills means there attacks will rarely discovered, according to IT security firm Taia Global
“Shall we play a game?” The UK and US are to launch cyber attacks on the City of London and…
LinkedIn's head security honcho shares his proactive security strategy, which begins with everyone buying in
KPMG study reveals communication between a company's board is the biggest hurdle to overcome regarding cybersafety
New report highlights growing awareness of cyber and mobile security, as tactics and threats change
Bellstone Consultancy Group to call on added Canadian protection with cloud data encryption
Microsoft accuses Google of harming customers following first Patch Tuesday of 2015
Brand new "Skeleton Key" malware can bypass the authentication on Active Directory systems
Junaid Hussain, who had been previously jailed for hacking, identified as founder of group that attacked US military Twitter account
Google will now only fix WebView vulnerabilities itself if they affect Android 4.4 KitKat or later