Shareholders lose out as financial impact of security breaches equates to £120 million loss of market value. And it's only…
The civil service has reportedly been forced to push the renegotiation of IT contracts down its list of priorities, meaning…
By monitoring sensor data, criminals web pages and malicious apps could potentially guess PINs to a surprising degree of accuracy
Russian Pyotr Levashov, suspected of being one of the Internet's biggest spam and malware operators, is arrested in Spain
Researchers discover a new strain of the notorious Mirai botnet which goes bitcoin hunting
Symantec says all the clues point to Longhorn's tools being ones included in WikiLeaks file dump
Travellers from the UK and other countries could be forced to provide mobile phone contacts and social media passwords and…
Users are tricked into believing their device is infected and forced to hand over personal data
The attacks make use of a previously undisclosed bug in Windows' Object Linking and Embedding (OLE) feature to take over…
Stolen data from customers in the UK and Poland includes names, addresses and credit card information
Apple and Google handsets have been patched, but other Android devices may still be vulnerable to the Broadcom Wi-Fi chipset…
Google updates tackles security vulnerabilities with Android devices as well as update for its Nexus handsets
As the Tax Day 2017 filing deadline of Tuesday April 18 nears, IBM is warning of an increase in tax-related…
Prevalent threat intelligence challenges include dealing with the volume and quality of data being collected
Printers are the biggest security threat to businesses, claims HP
Threat Intelligence and Data Governance capabilities come to Office 365
Facebook challenge to bulk search warrants for customer accounts dismissed by New York court
The UK has been the target of a systemic global hacking operation
Intel will still retain a 49 percent share in the new security company
Cloud security concerns and the early announcements from Teradata Universe 2017
Researcher Amihai Neiderman slammed Tizen for containing amateur level coding flaws
Attack code first used in 1996 is still in use by attackers building malware in 2017, according to new research…
IAAF president Sebastian Coe apologises for breach affecting athelete medical records
University of Edinburgh joins government-accredited national cybersecurity research scheme
Facial recognition might not be the best way to secure your new Samsung Galaxy S8...
Incidents involving the use of drones in nuisance or criminal cases grew twelve-fold in the UK over the past two…
US ISPs give privacy advocates a boost despite changes to FCC regulations
Macro malware, which is so 1990s, has made a comeback, joining other aging cyber-threats, such as PHP scripts and the…
OPINION: The Mail on Sunday slams Google, but should all the blame really be levied at tech companies?
April Fools' Day: How good are you at spotting fact from fiction?