The EU wants to force WhatsApp, iMessage and other Internet-based tools to abide by tougher data-protection rules, leaked documents say
About 80 percent of all Android gadgets are vulnerable, say experts
Hundreds of thousands of transactions may have been compromised in the latest hack
The company said personal data on employees at hundreds of UK customer businesses was accessed
A feature designed to make Linux-based networks harder to infiltrate has done the opposite. But can it really affect Tor?
Also extends Managed Security support to Microsoft Azure
Government gets powers to blacklist phones it thinks are being used by criminals behind bars
Cloud breakthrough? Microsoft plots way to enable secure data exchange in the cloud for users
'Linux.Lday.1' exploits unprotected Redis servers and infects PC with cryptocurrency mining software
Symantec warns of Instagram profile hack that uses compromised accounts to promote adult dating websites
Patch Tuesday: Admin tasks return to usual following recent Black Hat security conference, with patches for Office and browser flaws
This year's biggest Trojan malware has turned from spreading ransomware to spreading an ad-clicking backdoor
Facebook promises to give users more control over adverts buts says ad blockers threaten journalism and free services
Fedora Linux and Red Hat look into account vulnerability that could allow attacker to add, edit, or remove user or…
'Project Sauron' has been stealing data from groups in 30 countries since at least 2011, experts say
The attack affected servers at Oracle's MICROS retail division and may also have allowed access to point-of-sale systems
FTC Commissioner Terrell McSweeny details how the government agency is working to improve privacy and limit deceptive practices online—and makes…
Met Police's insistence on running aging Windows XP is putting Londoners' personal data at risk, it is claimed
The QuadRooter bugs could allow seemingly harmless apps to take over many Android gadgets
The latest vulnerability could allow attackers to take over the root functions of an iOS device
Variant of Zeus banking Trojan targets financial transactions in Brazil amid the backdrop of the Rio 2016 Olympic Games
Brits are expected to watch up an average of 6 hours on corporate networks during Rio 2016. Should IT departments…
Crippling threat...20 percent of firms hit by ransomware had to cease business operations
RIO 2016: Olympic sports fans and organisations warned about dodgy apps and social media scams trying to steal data and…
BLACK HAT 2016: Program will bait researchers into finding critical flaws in iCloud and secure boot firmware
BLACK HAT 2016: A researcher exposes design and control flaws in Windows 10 versions that have the capability to run…
Windows 10 received its first major update this week, but what do you know about the one operating system to…
IBM security group will test the mettle of security policies by carrying out testing on networks, hardware and humans
Digital currency rocked by another Bitcoin theft, but Bitfinex cannot confirm whether it was insider job or hack
Protocol problems...the new version of the HTTP (HTTP/2) has four “high profile” flaws, researchers caution