The Quick Heal report outlines the top malware afflicting Windows and Android users, with a brief low-down on each of…
Arbor security claims Rio was a success in terms of mitigating powerful, prolonged DDoS attacks
Battery Status API in HTML5 is being used to track user activity, warn security researchers
Test your mettle with our quiz and see how much you know about the cybersecurity world this year
InfoSec poll reveals security professionals thing UK will suffer from lack of information sharing if it decides to leave the…
If the UK decides to leave the EU, there will be no change in UK’s ability to protect itself, think…
Schneier also sees more government meddling in IoT security as ‘inevitable’
Nine tenths of UK organisations feel vulnerable to cyber threats – where should your priorities lie?
Hyppönen claims we're in a new era where the 'fog of cyberwar' is preventing us from knowing who is attacking…
Consultant working for government claims energy companies ignored their own security rules in power grid hack, as more attacks are…
A vulnerability in Asda's website found by a security consultant in March 2014 was left unchecked, but Asda claims no…
Amazon emails number of users advising password reset because of "improper" storage
Taxpayers foot multimillion pound GCHQ bill for better protecting the UK in cyberspace
And even though many have them have had wipe attempts, texts, photos, and emails still persist on hard drives and…
Researchers claim attackers can exploit co-located virtual machines to scoop up RSA keys of other users on Amazon's EC2 cloud…
Palo Alto Networks eyes rise to the top with 2015 billings growing 58 percent year-over-year
Spotify wants access to a whole new cache of user data, including photos, social media and location
Adobe's August Patch Tuesday update provides fixes for 34 identified Common Vulnerabilities and Exposures (CVEs)
Shares fall two percent as phone retailer suffers cyber attack that compromises credit card details, names and addresses of customers
The single most pervasive zero-day is use-after-free (UAF), but new research from HP detailed at Black Hat could change that…
Google's bring your own keys program marries cost benefits of public cloud computing with robust encryption security, the company says
Pakistan’s mobile operators ordered to shut down BlackBerry Enterprise Services amidst encrypted communications fear
On-premise cyber security platform will feature social media-style timeline and use machine learning to outwit the hackers
ViaSat wins General Dynamics contract for Scout SV encryption tech following successful use in Watchkeeper drones
Hardware for attacking computers via Wi-Fi caught the attention of a Boeing defense subsidiary, which wanted to use its drones…
F5 study reveals security concerns over DDoS are falling, despite the number of attacks being on the rise
Cloud-based password management stores critical company login details and enables users to have a different, unique password for every secure…
How can an SMB avoid compromising its data? Andrew Thomas from CSID says it boils down to four easily digestible…
Dr Eric Cole, who has just joined InfoSec Hall Of Fame, warns that most countries are not ready for cyber…
According to police records, 162,932 items of computing and communications equipment were stolen in the UK in the past year