Fujitsu Forum 2016: Cyber crime can now be considered a professional, targeted business, according to Symantec
DocuSign continues European expansion with cybersecurity investment in the Irish capital
The scope of knowledge Yahoo's staff had of the 2014 data breach is also under scrutiny
INTERVIEW: Splunk's security evangelist Matthias Maier talk bolstering cyber defences with machine data
INTERVIEW: Machine learning can help filter the increasing noise on complex IT networks to spot the emerging cyber threats that…
IN-DEPTH: As the war against malware rages, smart software could be the key to getting ahead of hackers
Infected sites could have been turned into botnets to launch DDoS attacks and spread malware
National Cyber Security Centre chief Dr Ian Levy wants an empirical, transparent approach to cybersecurity policy - not hysteria
Is Facebook a privacy champion? Admiral banned from using FB data in order to price insurance policies
Philip Hammond outlines the government's new cybersecurity strategy and how £1.9 billion will boost defences, enable law enforcement and aid…
The servers are claimed to have been used by NSA-sponsored Equation Group as staging areas for covert hacking activity
The hospital has been forced to shut down it IT network to seek out and destroy the virus
Two neural nets were created to communicate securely while a third tried to crack their inhuman cipher messages
Third-party security auditors will be brought in to help Microsoft Azure customers secure their Internet of Things deployments
ANALYSIS: While the details regarding the sources and methods of the Oct. 21 DDoS attack that took down vast areas…
In a SecTor keynote, F-Secure's Mikko Hypponen explains why ransomware is so bad and what the Russians really have in…
Oracle's latest Critical Patch Update, which fixes 253 vulnerabilities, is the company's second-largest CPU ever.
The bug affects most versions of Linux potentially exposing huge numbers of machines to hackers
The acquisition gives Malwarebytes access to the startup's adware an unwanted programe fighting tool
Tweaked Acecard trojan aims to trick gullible Android users into sending selfies and photos of their IDs
Scammers are trying to trick students into paying for application to the US student loan forgiveness programme
New privacy row as social networking sites halt access by data gathering app used by law enforcement
Is Blockchain a possible solution for securing weapons data for the US military, including its nuclear capabilities?
Symantec has discovered a trojan capable of hiding in the networks of financial institutions
People are becoming weary of constant security advice and businesses could pay the price for poor decisions, a report has…
IP Expo 2016: Sophos, Kaspersky and Trend Micro talk future threats from IoT, Hired cyber criminals, and security education
Botnets hop on high-speed city infrastructure to fire malware, spam and other threats across the Internet
IBM Managed Security Services identifies poor server patching as the reason for the bug's survival
Federal authorities saying they are investigating attempts to breach voter registration data and responding to state requests for assistance in…
ANALYSIS: More than a million security cameras, video recorders and other devices were used in attacks on a U.S. security…