Is it legal? Hundreds of websites are said to be tracking visitor keystrokes raising questions of legality
Security experts are astounded at revelations that Uber concealed a cyberattack but what can businesses learn from it?
Business PCs from Dell, Lenovo, HP and others contain flawed software that shipped with Intel processors
New Uber CEO comes clean about 2016 hack, claiming data was destroyed and new measures implemented. But can users and…
Queens University Belfast to host £5m institute that looks to make hardware more secure in era of IoT
Cisco is to contribute its world-spanning cyber-threat analysis to help battle increasingly sophisticated internet threats
ANALYSIS: You can’t prevent all attempts to penetrate your enterprise security, but you can impede the attackers and you can…
AWS re:Invent 2017: New government-focused region complements an existing deal that gives US intelligence agencies access to air-gapped cloud infrastructure
CA WORLD 2017: CA releases 20 new products and enhancements as it preaches the power of change through software
The banking Trojan, which imitates real banking apps to steal users' login details, has been reported on Google Play several…
The new Harvard programme is intended to put local and national election campaigns on guard against nation state hacking attacks
Android is used by almost half of our readers at work and some people out there still use BlackBerry
At the SecTor security conference, IBM Resilient Systems CTO Bruce Schneier makes a case for more regulatory oversight for software…
GitHub says move is an important step for open source security
Big Blue and partners deliver Quad9 DNS privacy and security service for malicious website protection
ANALYSIS: North Korea’s activities have changed in a way that may indicate it is gathering the information it needs launch…
Hackers access personal information on old website but credit card details haven't been exposed, says Cash Converters
The consensus is that IoT is a security threat. But should we really be concerned?
New rules governing how US agencies disclose cyber security flaws, as the FCC readies net neutrality reversal
Kaspersky publishes investigation findings that it says show its products were not used to stage assault which saw NSA code…
At the SecTor security conference, an MIT futurist details an open-source effort that aims to restore trust and improve data…
Not again. Google Play found to host malicious Android apps that seem legitimate, but install a mobile banking trojan
No zero-day vulnerabilities this month, but still a moderate number of patches from Microsoft
Grim picture...social media is being manipulated, mobile connectivity is being censored, and attacks against journalists is on the rise
New banking Trojan discovered and is active in the wild hitting targets in the United States and the UK
Amazon admits sale will help AWS comply with local regulations introduced earlier this year
Vietnamese security firm Bkav says its proof of concept shows face ID isn't secure
Confidential KPMG documents accessed because of security flaw with sign in process
No more leaky S3 buckets? Amazon adds encryption and admin dashboard for better security control