BlackBerry Hub+ gives Android users a 30 day free trial as cross-platform strategy continues
Claims to be first time a security vendor has offered rewards for disclosures of vulnerabilities with its products
Tripwire research finds Ruckus routers are susceptible to intruders
At Black Hat, a researcher details how both naive users and hosts of the popular accommodation sharing service could be…
Battery Status API in HTML5 is being used to track user activity, warn security researchers
PREVIEW: The annual hacker gatherings will bring out new research in car, payment and internet protocol security
Yahoo said it is investigating reports that 200 million users' data is being sold online
Opera adds more features to the desktop version of its browser as it seeks to compete with Chrome, Firefox and…
GhostMail said it doesn't want its encrypted email service used by 'the wrong people'
The Citibank employee admitted to intentionally taking down 90 percent of the company's network across North America
INTERVIEW: BT Security chief Mark Hughes explains how BT protects itself against attacks, how Brexit impacts skills gap and why…
Windows 10 Anniversary Update is on its way, but do you have Windows 10 installed at home or work already?
Deleted WhatsApp messages could be easy to recover, with unencrypted copies stored on iCloud, a researcher finds
SwiftKey users reported seeing other users' email addresses and autocorrect suggestions, prompting SwiftKey to shut down its cloud sync service
ANALYSIS: Recent FCC pressure is resulting in some movement by carriers to try to quell robocalls, but much needs to…
Windows 10 is one, but find out more about Microsoft's operating system through the years. Just don't mention Windows ME
BT's been in the news again but what do you know about the UK's biggest mobile and broadband provider?
ANALYSIS: One year after the Stagefright Android flaw was first reported, its effects are widespread. More than 100 related flaws…
Keystrokes from wireless keyboards transmit with no encryption and can be intercepted from hundreds of feet away
BlackBerry DTEK50 falls back on it security credentials in bid to stay relevant in competitive Android smartphone market
Ransomware will exploit server vulnerabilities, proliferate across networks and use encryption to hide itself, says Cisco report
No More Ransom offers decryption keys to encourage ransomware victims not to pay
Details were reportedly stolen using credentials leaked from a gaming site three years ago
ANALYSIS: Once again the Democratic Party has been seriously embarrassed by an email leak scandal. But without the leaks the…
The attack provided complete access to Pornhub's database and exposed two PHP flaws
Good Dynamics Secure Mobility Platform now available in Microsoft Azure Marketplace
Threat of cyberattacks prompt Estonian officials to investigate possibility of using UK data centres for citizen data
Office for National Statistic report shows that one in ten people are victims of fraud or cybercrime
ARM, Symantec and others address Internet of Things security challenge with new protocol
iOS 9.3.3 and Mac OS X 10.11.6 fix a range of vulnerabilities but none so important as a TIFF flaw…