ANALYSIS: Chipotle is the latest victim of Point-of-Sale malware that steals credit card information, demonstrating the continued risks that face…
Blue screens of death may have been the worst-case scenario for Windows XP devices
Cyber security firm Check Point reckons it could be the biggest malvertising campaign to hit Google Play
Security researchers warn of a subtitle vulnerability that affects VLC, Kodi and other popular media software
ANALYSIS: Quantum computing's potential to crack encryption worries the NSA, so it's developing standards and strategies for a post-quantum world
The Cron hacking gang used malicious apps and software to infect a million Android smartphones
ANALYSIS: WannaCry ransomware worm outbreak isn't the only cybersecurity incident that users need to worry about, as a pair of…
Major hack attacks appear to be a money making exercise for North Korea's regime
Cyber security researchers have identified a potential WannaCry successor
The portal aims to provide security teams with the latest data on cyber threats
Computing armageddon was forecast in the lead up to the new century, yet for many the Y2K Millennium bug was…
IBM urges customers to update antivirus and destroy dodgy USB sticks after mishap
ANALYSIS: Attackers leak new season of the Netflix show "Orange Is the New Black," exposing a weakness in the distributed…
Verizon's 2017 Data Breach Investigations Report paints a bleak picture of the current state of cyber security
Users are advised to quickly patch to the latest version of the web app platform
Facebook's WhatsApp may soon be able to use customer data as agreement with European watchdogs nears
Symantec says all the clues point to Longhorn's tools being ones included in WikiLeaks file dump
University of Edinburgh joins government-accredited national cybersecurity research scheme
Macro malware, which is so 1990s, has made a comeback, joining other aging cyber-threats, such as PHP scripts and the…
New zero-day attack exploits old Windows vulnerability to take 'full control' of 'major antivirus' products
The second day of the Pwn2Own 2017 hacking competition reveals Windows, macOS, Adobe Flash and web browser exploits
Check Point found malware lurking on mobiles form a major tech firm and a telecoms company
ANALYSIS: Exposure of the CIA's hacking tools give an unsettling look at the capabilities of U.S. spies, but also a…
The open-source WordPress blogging and content management system fixes six vulnerabilities, including three Cross Site Scripting flaws
Shamoon malware appears to have evolved into a browser-lurking cyber threat
A 50-member team of Google engineers voluntarily worked to patch 2,600 open-source projects against a Java deserialization bug in 2016
Spammergate: Researchers discover vast database of email addresses and suggestions of cybercrime against spam kings sending 1bn messages a day
Eugene Kaspersky says change is needed in order to defend against IoT security threats during theatrical appearance at MWC 2017
The malware also attempts to steal user credentials for the Chinese social network QQ
Firemon CTO Paul Calatayud explains why he calls it the Internet of Malicious Things and why virtualisation is the greatest…