Dutch researchers have demonstrated that secret AES encryption keys can be extracted using recording equipment that costs under 200 euros
Experts have suggested that a foreign government could be responsible
As the benefits of using cloud for cyber security become clearer, is it now the only realistic way forward for…
Weak default passwords in the Super Hub 2 pose a hacker attack risk
It's been a busy week filled with tech news, but have you been paying attention?
INTERVIEW: Jan Smets, a data protection officer at digital security firm Gemalto, discusses getting ready for GDPR
"Brutal Kangarooā€¯ tool used by US spooks to hack into computers not connected to the Internet
Emails and passwords belonging to British MPs and high level public servants traded online
A browser hijacking operation initially reported to have 250 million victims by security firm Check Point isn't quite that large,…
INTERVIEW: Mark James, IT cyber security specialist at ESET, discusses cyber threat trends with Silicon at Infosecurity 2017
Researchers at Proofpoint say the malvertising in question has popped up around the world on several high-profile websites
CyberArk Labs finds GhostHook attack can bypass Microsoft's protection of Windows 10 kernel
The spread of WannaCry appears to not be slowing down anytime soon
Redmond did temporarily switch off third party anti-virus products for Windows 10, the firm admits
Consumers now more aware of ransomware and place onus on businesses to protect their personal data
Microsoft remains tight-lipped on the cause of the Skype outage over the past two days
Another example of the importance of keeping your computer systems up to date
Cisco claims 'new network' is a breakthrough, using machine learning to automate and secure enterprises, without impacting privacy, for the…
Linux, BSD and Solaris are all affected by memory management bugs that could allow attackers to execute malicious code
It should come as no surprise, but cyber threats are continuing to rise
A contractor for the Republican Party has accidentally exposed personal data on more than 198 million citizens
Banks under the rule of the European Central Bank (ECB) set to face breach notification rules similar to GDPR
A European Parliament committee has called for end-to-end encryption to be enforced on all forms of digital communication
Cloud security still has the greatest mismatch between demand and supply
Google is to add more engineering resources and human experts in its efforts to remove extremist content from YouTube
State-sponsored cyber attacks have become more prominent than ever, with espionage and the influence of internal affairs leading the way
An unusually authentic-looking phishing scam attempts to obtain a photo of the target in order to launder stolen funds
Students dismayed after personal information is sent to over 300 colleagues
CherryBlossom can monitor Internet traffic and inject malicious code into targeted routers
Consumer watchdog Which? has created a map highlighting cyber scam hotspots