Forcepoint's Global CTO Nico Fischbach discusses the future of security, his networking background and why he might open a restaurant
The Loapi malware, which poses as adult or security apps, runs processor-intensive scams that can cause a phone to overheat…
FireEye warns that a nation-state appears to be infiltrating critical-infrastructure sites and developing ways to cause physical damage
The Cryptography vulnerability first detailed in 1998, still has the potential to impact modern websites
US government passes law that bans government agencies from using Kaspersky Lab security tools
ANALYSIS: Scammers are spoofing the Facebook user's account names to engage in phony Messenger conversations to phish for information. Here's…
ANALYSIS: Yet another former NSA employee has taken secret information home, allegedly enabling Russian hackers to gain access to data.
PayPal only bought bill payment processor TIO Networks For £177m in July but has suspended operations
ANALYSIS: MPs admit to sharing passwords and leaving computers unlocked because of convenience, but the people deserve better
Supermarket Morrisons could be forced to pay compensation after rogue employee posted salary details online
McAfee's first major acquisition as an independent security firm is Skyhigh Networks
NHS Digital plots £20m division to help stop another WannaCry attack
ICO and NCSC are looking into the scale of the Uber hack before they take next steps
Security experts are astounded at revelations that Uber concealed a cyberattack but what can businesses learn from it?
New Uber CEO comes clean about 2016 hack, claiming data was destroyed and new measures implemented. But can users and…
ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can…
CA WORLD 2017: CA releases 20 new products and enhancements as it preaches the power of change through software
At the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software…
ANALYSIS: North Korea’s activities have changed in a way that may indicate it is gathering the information it needs launch…
Hackers access personal information on old website but credit card details haven't been exposed, says Cash Converters
Kaspersky publishes investigation findings that it says show its products were not used to stage assault which saw NSA code…
At the SecTor security conference, an MIT futurist details an open-source effort that aims to restore trust and improve data…
Vietnamese security firm Bkav says its proof of concept shows face ID isn't secure
ThreatConnect's director of research discusses her career in IT and her investigations in to some of the most notable hacks…
Previously unknown hacking group found targeting foreign policy and diplomatic targets
ICO prioritises reducing 'trust deficit' head of GDPR next year
ANALYSIS: Experts on international terrorism turn from describing how terrorists use social media to reporting the level of chatter on…
The nation dismisses Britain's security minister's claims as "groundless speculation"
The ransomware appears to be a variant of the Petya ransomware
ESET says it found the OSX/Proton malware in a version of Eltima's media player