Hackers can exploit a command injection flaw to execute malicious code on Netgear routers
Yahoo moved to patch the flaw before the bug could cause chaos
Called BlackBerry Secure, the platform aims to help businesses manage their mobile and connected devices and provide secure communications.
Experts discuss safeguarding against drones that pose increasing threats to prisons, airports and public safety
Ransomware attacks developed significantly in 2016, both in prevalence and sophistication, making it the threat of the year for businesses…
NHS Trusts have been caught running thousands of outdated and unsupported Windows XP machines, despite a developing threat landscape and…
Rise of the botnets levies threats at businesses and governments
Nintendo has launched a bug bounty programme, offering rewards of up to $20,000 for vulnerabilities around its 3DS family of…
The Mirai botnet has spread like wildfire and now infects 2,398 home routers across the UK, with 99 percent of…
ICO fines RSPCA and British Heart Foundation for "wealth screening" to get more donations
Toys that spy? Formal complaint filed in the US against toy maker and Nuance Communications
More than 85 million usernames and email addresses have been stolen by unrevealed hackers
40 organisations are now part of the effort to train Watson for Cyber Security in an effort to improve security…
A shared database will be used to flag up content that appears to be trying to spread terror speech
The funding is to support a cloud data-access programme, DNA database, data analytics lab and other schemes
Security researchers have added more than 115 million malware samples to their databases so far this year, with Windows viruses…
ANALYSIS: With the possibility that fake news may have impacted the US election, people are giving a new look to…
Federal study calls for efforts on government-sponsored hacking and insecure Internet-connected devices
Visa's online payment system fails to pick up on multiple invalid credit card attempts across multiple websites
Laptops, smartphones, gaming consoles and in-car displays are amongst the systems vulnerable to the USB-based electrical shock attack
ANALYSIS: The rules of traditional warfare don't apply in cyber war, even to the point where it's hard to tell…
Amazon introduces AWS Shield managed service to protect against crippling DDoS attacks
Mirai botnet strikes again, attacking routers and cutting-off broadband
Unwanted event invitations continue to appear in iPhones calendars, but Apple remains silent on the matter
National Lottery and experts suggest accounts breached by reusing compromised credentials
IN-DEPTH: Drew Houston outlines plans for European expansion and how Dropbox will change the conversation from syncing files to syncing…
Court documents reveal US investigators hacked thousands of suspects' computers around the world
The petition is to be considered for parliamentary debate after receiving more than 130,000 signatures
Deutsche Telekom refuses to rule out "external parties" as it rolls out software upgrade to affected routers
Attackers can record sound from hacked systems, even when microphones are muted, switched off or unplugged, finds a study