Can you remember what happened in the IT world over the past seven days?
ANALYSIS: Exposure of the CIA's hacking tools give an unsettling look at the capabilities of U.S. spies, but also a…
The whistleblowing site will publish 'additional documents' after fixes have been pushed out to citizens
Organised crime study reveals that nearly all criminal gangs are now using some form of technology
Apple has begun to crackdown on apps that use third-party SDKs to modify iOS apps in real-time after they have…
WhatsApp is working with Y Combinator to test business messages so Facebook can make some money from its expensive acquisition
The open-source WordPress blogging and content management system fixes six vulnerabilities, including three Cross Site Scripting flaws
Watching TV but who is watching you? CIA allegedly uses Samsung TVs to spy on citizens
The search giant is being probed yet again by a European watchdog
Shamoon malware appears to have evolved into a browser-lurking cyber threat
Scammers reportedly operating at least three call centres in two Indian cities targeting TalkTalk customers
A 50-member team of Google engineers voluntarily worked to patch 2,600 open-source projects against a Java deserialization bug in 2016
Spammergate: Researchers discover vast database of email addresses and suggestions of cybercrime against spam kings sending 1bn messages a day
The information commissioner is to investigate whether citizens' data was used illegally by the Leave.eu campaign ahead of the Brexit…
Big data breach shows organisations of all sizes and sectors are open to the attentions of cyber criminals
Industrial sabotage was voted more likely than attacks by cyber criminals, disgruntled employees and political conspiracy
Microsoft announces Azure Blueprint in line with government security practices and Yammer integration with Office 365 Groups
The hidden IFrames cannot hurt Android devices but acts as a carrier for malicious code
The security credentials of Password Managers on Android called into question after discovery of multiple flaws
Eugene Kaspersky says change is needed in order to defend against IoT security threats during theatrical appearance at MWC 2017
Researcher has great fun using one of Google's services to bypass another Google service
Yahoo regulatory filing reveals continued impacts of mass security failings
CloudBleed and TicketBleed showed how cloud services, while usually more secure, can fail significantly. Will they turn off companies to…
The malware also attempts to steal user credentials for the Chinese social network QQ
The CloudPets user database was stored unprotected online, and weak passwords meant hackers could access stored children's messages
The heist, which officials suggested may have been carried out by a nation-state, extracted only basic data on 850 government…
Google Zero's latest unpatched bug is ranked 'critical' and could be used to target Windows 10 Edge and Internet Explorer…
Issues lasted for approximately 4-5 hours, with London Birmingham and Manchester being among the most heavily-affected areas
The first face-to-face round of this year's Cyber Security Challenge UK highlights the risk of insecure IoT connected devices
Firemon CTO Paul Calatayud explains why he calls it the Internet of Malicious Things and why virtualisation is the greatest…