As part of Digital Single Market, the European Commission initiates public-private investment programme to strengthen Europe's cybersecurity credentials
Large financial institutions and gaming companies are amongst those hit by the latest IoT botnet attacks
The rapidly spreading 'Hummer' Trojan installs unwanted apps, uses up bandwidth and can't be removed
'Largest assault to date' for mitigation provider Imperva Incapsula as gambling company hit by nine-vector DDoS
A new government policy requires the use of web encryption and anti-phishing email policies
The appeal annuls a ruling that had prompted Facebook to block access to its Belgian site for non-users
The influx of fans to France for Euro 2016 may represent a significant security risk for enterprises
As Office 365 use expands, security risks are becoming harder to spot, researchers warn
CloudLock's technology protects content based on remote services such as Office365, Google Drive and Salesforce
An update to the CryptXXX ransomware has already received substantial ransom payments over a period of less than three weeks,…
A botnet made up of more than 25,000 hacked security cameras spread around the world is being used to launch…
Next month's deadline for updating to Windows 10 for free may come as a relief to some users
The 'Bart' ransomware doesn't need to connect to an external server before encrypting a system's files and demanding £1,500
The tool, called Selfrando, could greatly improve on the attack protection provided by techniques such as ASLR, researchers say
The malware's multiple exploits allow it to target 90 percent of current Android devices, researchers say
Penetration testers brute force Uber for bug bounty programme, and also find hidden $100 free ride voucher
Test your mettle with our quiz and see how much you know about the cybersecurity world this year
Intel Security says employees are not being educated about the risks of adding people they don't know on LinkedIn amid…
A newly discovered ransomware variant does away with downloading a malicious file, carrying out the dirty work itself
The flaw could allow attackers to take over users' entire networks, say security researchers
Top researcher pockets £52,000 as Google uses Android vulnerabilities to secure Android N
All iOS applications will be required to use Secure HTTP by the end of this year, with a few exceptions
InfoSec poll reveals security professionals thing UK will suffer from lack of information sharing if it decides to leave the…
Acer is preparing to alert customers to a data breach that affected Acer's e-commerce site from May 2015 to April…
Fallout from LinkedIn breach seems to continue as GitHub admits some accounts were accessed by attacker
The scholarship program and improved certifications are aimed at growing the number of skilled cyber-security experts, officials say
A major botnet has mysteriously disappeared in recent days, killing off two large-scale malware campaigns
McAfee identifies common apps that could be commandeered by attackers to steal information or carry out financial transactions
If the UK decides to leave the EU, there will be no change in UK’s ability to protect itself, think…
Symantec pays almost double what Blue Coat was worth last year as it attempts to improve enterprise security credibility and…