As enterprises continue to develop their hybrid cloud architectures, more sensitive information has the potential to become exposed. Learn about…
Details of defence plans, military personnel and witness protection details exposed during outsourcing project.
Up to £14.5m will be invested into the innovation centre, with established firms working alongside cutting-edge startups.
"I'd rather be associated with being hacked by some porn site," says one unhappy football fan
Natwest has contacted customers it believes could have been affected by the Three data breach
Twitoor, uncovered by ESET, can plague Android devices with malicious malware
Secret documents on Indian submarines built by French contractor DCNS have been leaked, according to Australian media
Black Hat survey finds enterprises are increasing their attackable surface area by 100 times with a move to cloud infrastructure…
The Linux Foundation's new online Linux security training program will cover a broad range of topics, from application security to…
The QuadRooter bugs could allow seemingly harmless apps to take over many Android gadgets
The latest vulnerability could allow attackers to take over the root functions of an iOS device
Yahoo said it is investigating reports that 200 million users' data is being sold online
The Citibank employee admitted to intentionally taking down 90 percent of the company's network across North America
SwiftKey users reported seeing other users' email addresses and autocorrect suggestions, prompting SwiftKey to shut down its cloud sync service
ANALYSIS: One year after the Stagefright Android flaw was first reported, its effects are widespread. More than 100 related flaws…
Details were reportedly stolen using credentials leaked from a gaming site three years ago
The attack provided complete access to Pornhub's database and exposed two PHP flaws
Most ransomware groups now have responsive and friendly customer-service operations, finds a study
Installer bug means many Windows systems must now keep two distinct versions of Flash Player up to date
The breach resulted from an unpatched bug, Canonical admits
A new family of malicious code aims to make it harder for users to cancel affected bank cards
The tool is intended for defensive purposes, but could also be used to facilitate password attacks
Hidden audio commands can be used to take control of popular voice-activated devices, researchers say
A trove of data on 80,000 users did not come from Amazon's systems, the company said, and may have been…
The malware, thought to originate in China, generates £232,000 per month in counterfeit ad revenues
A malicious version of the popular game is seeking to take over Android handsets
Report finds police officers across UK regularly abuse positions of power to access personal data
The country is to legally require open source licensing for all new software projects
Media savvy Millennials still falling for same tricks as fraud rockets 52 percent among those under 30
Companies need to look for ways to go on the offensive against 'industrialised' cyber-criminals, finds a report from BT and…