ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the data breach might have been much worse

ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the data breach might have been much worse
Good Dynamics Secure Mobility Platform now available in Microsoft Azure Marketplace
Office for National Statistic report shows that one in ten people are victims of fraud or cybercrime
iOS 9.3.3 and Mac OS X 10.11.6 fix a range of vulnerabilities but none so important as a TIFF flaw that affects all versions
After lying dormant for years, flaws in the HTTP Proxy header used in programming languages and applications, such as PHP, Go and Python, have now been fixed
Oracle's July Critical Patch update fixes 276 different vulnerabilities. Will 200-plus flaws be typical for future updates?
Fresh concern raised about the security of the very products designed to protect users from cyber nastiness
Cybercriminals will likely target Rio 2016 as researchers warn Olympic searches are already returning threats and federation websites compromised
Depressing reading as active malware families grow and HummingBad infects 85 million Android devices
Forensic experts join SWIFT to help prevent customer fraud and bolster community security
The clock is ticking. Ransomware victims have just 96 hours to cough up or it begins deleting files
Malware dubbed 'ranscam' asks for payment to unlock files, but in reality has already deleted them
Routine fixes for Office and web browsers, but no flaws are being actively exploited in the wild
University of Florida researchers say the answer to stopping ransomware is to let it onto your system first
Playing catch up? Facebook tests encrypted "secret conversations" after last month's security scare concerning chats
Security researchers warn of a serious stack overflow vulnerability in a number of devices from D-Link
Avast buys AVG for $1.3bn, giving it access to 400m PCs, smartphones, tablets and connected IoT devices
Malware targets OS X and gives attackers webcam access via Tor and full access of compromised Mac
Another round of funding for cyber-security firm backed by former Autonomy boss Mike Lynch
ANALYSIS: New zero-day vulnerability may also affect computers from other makers that used similar Intel UEFI reference code to create their BIOS firmware
Media savvy Millennials still falling for same tricks as fraud rockets 52 percent among those under 30
VIDEO: ESET’s Mark James tells us how to best protect from particularly painful malware
Apple will use differential privacy to collect data on groups while keeping individuals anonymous. This emphasises privacy, while giving access to data
Don't fall for it. Devious malware utilises user interfaces of Android apps in order to steal sensitive data
Vulnerabilities “are as bad as it gets” says Google's Project Zero, and could endanger millions of users
The use of machine learning to identify suspicious online activity is a new and important capability in securing the network, but privileged users were the weak point until now.
Malwarebytes becomes sponsor of NASCAR team after its testing data was encrypted by ransomware
Fresh privacy concern? US Customs proposes to screen social media profiles of travellers to the United States
But Microsoft insists that only a small number of Office 365 were targetted and the attack was blocked within hours
Safe Habour advice. British data protection act should be used when transferring data to US, says ICO