Secret documents on Indian submarines built by French contractor DCNS have been leaked, according to Australian media
About 80 percent of all Android gadgets are vulnerable, say experts
Hundreds of thousands of transactions may have been compromised in the latest hack
The attack provided complete access to Pornhub's database and exposed two PHP flaws
A trove of data on 80,000 users did not come from Amazon's systems, the company said, and may have been…
Companies need to look for ways to go on the offensive against 'industrialised' cyber-criminals, finds a report from BT and…
The flaw could allow attackers to take over users' entire networks, say security researchers
The remote login software acknowledged a 'significant' number of users have been hit by attacks involving stolen passwords
More than 360 million MySpace accounts are the latest to go up for sale on the dark web
Hackers backed by North Korea may be linked to a group that has carried out a string of attacks on…
More than 100 suspects were reportedly involved in a coordinated operation that used about 1,600 forged South African credit cards
A 23-year-old man has been named as the culprit behind a data breach affecting 55 million voters
The FBI is to be given the authority to search suspect computer systems around the world if they use anonymisation…
Ghost Squad hackers take down key KKK website as part of its fight against "blunt racism"
FBI asked judge to help install covert encryption-breaking software in 2003
The breach could be the biggest-yet hack of government-held data, according to Trend Micro
Dell SecureWorks report warns that business is booming for the dark web as hacking gets more professional and profitable
ANALYSIS: While the vast quantity of information revealed in the breach of the Mossack Fonseca law firm far exceeds the…
The leaked database of detailed identity information previously circulated in the criminal underground
BLOG: The FBI was able to get access to the data on a terrorist's iPhone 5c without Apple's help. What…
The controversial hacker said the prank was intended to demonstrate the security risks of the 'Internet of Things'
Apple hearing suspended after government files motion claiming a third party method of getting into the San Bernardino's iPhone has…
Context Information Security explains why organisations increasingly see penetration testing as a key part of their cyber security strategies
Hackers who once worked for the Chinese government may now be carrying out ransomware attacks, finds a report
Telecoms and utilities companies hold valuable data but are relatively unprepared for cyber-attacks, according to Cebr
In 2015 hackers turned to hacking banks directly, rather than targeting end users, according to Kaspersky Lab
The incident follows hacks targeting CIA director John Brennan and other prominent US political figures
The tentative agreement would reportedly allow UK authorities to gather data from US communications firms, and vice-versa
The T9000 malware is the latest in a line that has previously been linked to cyber-spies, researchers say
Mark Amory, ethical hacking expert at IT training firm QA, explains why ethical hackers are the unsung heroes of the…