Cyber criminals are using the Kelihos botnet to extort Bitcoin payments out of the ransomware's victims
ANALYSIS: Although a 665Gbps attack is considered an outlier today, there will likely come a day when it is not…
Data breaches from hack attacks continue to get bigger and bolder but which of these do you remember?
ANALYSIS: Hackers have stolen details of 500m Yahoo accounts. Here's what you should do and what businesses should do next
Sky and BT email users on the Yahoo Mail platform are urged to reset their passwords following data breach
ANALYSIS: Integration with partners such as Cisco and centrally managed restrictions make iOS 10 a more secure enterprise platform, according…
Lax IoT security is allowing cyber criminals to syphon bandwidth to launch attacks on big businesses
macOS Sierra isn't just a pretty face. Apple has patched quite a few security flaws, including one that affects Docker
Webroot's threat intelligence data identifies Asian countries as a hotbed of malicious IP addresses
Keen Security Lab researchers discover a cyber vulnerability in Tesla's connected car
Android's built-in protection which flags warnings about apps trying to send premium rate messages without user consent can be manipulated…
Researchers say Windows 10 Safe Mode flaw is easy to exploit but Microsoft doesn't acknowledge it as a primary threat
The spyware harvested user and device data from infected Android smartphones
Big browsers take another shot at the tormenting website
Security expert Bruce Schneier suspects state-sponsored DDoS attacks are being levied at major internet infrastructure providers to test cyber defences
Intel Security cyber threat data idetifies the legacy IT of hospital as vulnerable to hackers
Sophos' CEO discusses the challenges and opportunities of being a publicly traded security company in 2016
Backdoor.OSX.Mokes can swipe data from Apple's operating system
More media server flaws surface as Google splits Android updates into three different patch levels. The update provides patches for…
A feature designed to make Linux-based networks harder to infiltrate has done the opposite. But can it really affect Tor?
'Linux.Lday.1' exploits unprotected Redis servers and infects PC with cryptocurrency mining software
FTC Commissioner Terrell McSweeny details how the government agency is working to improve privacy and limit deceptive practices online—and makes…
ANALYSIS: Bash support in Windows 10 Anniversary Update is valuable tool for developers, but needs to be used carefully because…
Variant of Zeus banking Trojan targets financial transactions in Brazil amid the backdrop of the Rio 2016 Olympic Games
RIO 2016: Olympic sports fans and organisations warned about dodgy apps and social media scams trying to steal data and…
BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run…
At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be…
PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security
INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why…
Ransomware will exploit server vulnerabilities, proliferate across networks and use encryption to hide itself, says Cisco report