UPDATED: Researcher says WhatsApp can reissue encryption keys for offline devices, compromising privacy. WhatsApp says there is no backdoor and…
Former major of New York Giuliani accepts position as leader of Donald Trump's new cybersecurity team
Switzerland's Privacy Shield data transfer agreement with the US is similar to the EU, aiding multinationals and offering potential Brexit…
Individual states will still have oversight and control over their election systems, but the move makes a statement “domestically and…
AVG 2017 not has access to Avast's CyberCapture tool for real-time threat detection
ANALYSIS: Despite claims about advanced security, the FTC says D-Link hard-coded login credentials leaving encryption keys unprotected and publicly exposed
Google starts the new year with another large security update for Android, once again patching mediaserver, Qualcomm and Linux kernel…
CES 2017: Lock it down. Security players tout offerings to secure smart homes of the future
The trojan hijacks DNS servers and replaces them with malicious versions to re-direct web traffic
ANALYSIS: Constant bad news about Russian hacking and the increasing prevalence of ransomware made 2016 an IT security disaster... but…
IOactive finds security flaws in Panasonic's Avionic In-Flight Entertainment (IFE) system that could potentially give an attacker unauthorised access
INTERVIEW: MobileIron CEO Barry Mainz tells Silicon about PC management, the rise of IoT and why it is better equipped…
Hackers can use the decade-old tool to execute stealthy cyber attacks
Yahoo moved to patch the flaw before the bug could cause chaos
The Mirai botnet has spread like wildfire and now infects 2,398 home routers across the UK, with 99 percent of…
40 organisations are now part of the effort to train Watson for Cyber Security in an effort to improve security…
ANALYSIS: With the possibility that fake news may have impacted the US election, people are giving a new look to…
"I'd rather be associated with being hacked by some porn site," says one unhappy football fan
ANALYSIS: The rules of traditional warfare don't apply in cyber war, even to the point where it's hard to tell…
Mirai botnet strikes again, attacking routers and cutting-off broadband
National Lottery and experts suggest accounts breached by reusing compromised credentials
ANALYSIS: You’re not paranoid. Cyber-criminals really are after your company’s money and its data and they won’t stop at anything…
ANALYSIS: Despite the suspicions a group of computer scientists, a recount of close presidential election tallies in three states won't…
Malicious actors have been found to be using the Ask search bar software to distribute malware of its users machines
ANALYSIS: Encryption keys are wonderful things that allow your organisation to conduct secure communications without issue- as long as you…
Android malware appears to be increasingly tailored to target specific banking services
Qualcomm is offering up to $15,000, approximately £12,000, to people who spot bugs in its modems and processors.
The security giant looks to turn its ailing consumer security software division
ISPs set to be required to keep your internet search history on record for at least a year in order…
Law enforcement could get their hands on call data if it is sent to iCloud for 'no reason', claims Russian…