The banking Trojan, which imitates real banking apps to steal users' login details, has been reported on Google Play several…
The new Harvard programme is intended to put local and national election campaigns on guard against nation state hacking attacks
Android is used by almost half of our readers at work and some people out there still use BlackBerry
At the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software…
GitHub says move is an important step for open source security
Big Blue and partners deliver Quad9 DNS privacy and security service for malicious website protection
ANALYSIS: North Korea’s activities have changed in a way that may indicate it is gathering the information it needs launch…
Hackers access personal information on old website but credit card details haven't been exposed, says Cash Converters
The consensus is that IoT is a security threat. But should we really be concerned?
New rules governing how US agencies disclose cyber security flaws, as the FCC readies net neutrality reversal
Kaspersky publishes investigation findings that it says show its products were not used to stage assault which saw NSA code…
At the SecTor security conference, an MIT futurist details an open-source effort that aims to restore trust and improve data…
Not again. Google Play found to host malicious Android apps that seem legitimate, but install a mobile banking trojan
No zero-day vulnerabilities this month, but still a moderate number of patches from Microsoft
Grim picture...social media is being manipulated, mobile connectivity is being censored, and attacks against journalists is on the rise
New banking Trojan discovered and is active in the wild hitting targets in the United States and the UK
Amazon admits sale will help AWS comply with local regulations introduced earlier this year
Vietnamese security firm Bkav says its proof of concept shows face ID isn't secure
Confidential KPMG documents accessed because of security flaw with sign in process
No more leaky S3 buckets? Amazon adds encryption and admin dashboard for better security control
Report questions whether local authorities have capability to combat cyber threats and safeguard personal data
Not again...sensitive health data on university staff member emailed to hundreds of students
Redmond's hyperscale cloud hardware design completed, as it now seeks security standard with Project Cerberus
Reports suggest Apple plans to bring some iPhone X features, including Face ID, to the iPad next year
ThreatConnect's director of research discusses her career in IT and her investigations in to some of the most notable hacks…
Previously unknown hacking group found targeting foreign policy and diplomatic targets
ICO prioritises reducing 'trust deficit' head of GDPR next year
The fraudulent developer managed identify themselves as 'WhatsApp Inc.' on Google Play, bypassing the company's filters
The Tor project has released a temporary fix for an issue that could disclose users' true IP information when they…