Ongoing incident could last several days, experts warn, following European Union measures to crack down on state-sponsored cyber-disruption
Lawsuit accuses Amazon and Ring of failing to provide adequate protection against cyber-attacks amidst rash of security incidents
Company urges Android users to update to latest version of app after finding bug that could allow account takeovers and…
New York Times follows Donald Trump's movements in real time as part of exposé into lack of regulation around smartphone…
Londoner Kerem Albayrak threatened to factory reset 319 million iCloud accounts in 2017 – but authorities say he was only…
Data including names and phone numbers could be used by criminals to carry out phishing attacks, in latest Facebook privacy…
Users must reset online passwords after Oyster accounts maliciously accessed over the summer, but in the meantime cards can still…
Unpatched 'StrandHogg' vulnerability found to be targeting at least 60 financial institutions, but could also be used to carry out…
We spoke to Google’s Joe Valente about the tech giant’s vision of the cloud, privacy, data and security and its…
Hackers make off with customers' personal details in second online attack to affect Chinese smartphone maker in two years
Users with older hardware components may be out of luck as Intel culls software drivers and BIOS updates for out-of-service…
Nvidia's GeForce Experience also affected by locally exploitable flaws, which could allow code execution, escalation of privilege or denial of…
IT spending in Europe and worldwide seen coming out of slump in 2020 as currency pressure eases – and firms…
Cash deal sees OpenText expand its cloud business while adding Carbonite's data protection and end-point offerings to its own security…
ESET, Lookout and Zimperium to help scan Android apps before their publication on Google Play Store as malware continues to…
Paradise 'ransomware-as-a-service' latest to be hacked by security researchers, who have released keys for most of its dozens of variants
Cloud Conformity acquisition aimed at helping customers guard against misconfigured public cloud accounts, beginning with Amazon Web Services
Malicious third-party apps for Google Home and Amazon's Alexa can listen in on conversations and trick users into revealing passwords
Turla hacking group carried out at least 20 successful cyber-raids around the world using Iranian attack tools, NCSC says
Acquisition of Oxfordshire-based cyber-security firm, which aided NHS during WannaCry attacks, follows fall in value of sterling in wake of…
Mozilla has removed features that exposed the browser to code injection attacks via its about: pages and JavaScript's 'dangerous' eval()…
German developer releases thousands of decryption keys for Muhstik ransomware after being forced to pay out £600 to decrypt his…
New research highlights vulnerability risk of using potentially insecure code snippets posted on social media outlets such as Stack Overflow
Police acknowledge working with private King's Cross developer on face recognition scheme, amidst ongoing concern about the use of the…
Two variants of 'PDFex' attack could allow PDF documents to be modified so that their contents are automatically exfiltrated to…
Newly discovered Mac malware includes copy of real share-trading app, but also steals data and carries out other malicious functions…
Palo Alto Networks' Unit 42 finds previously unknown tools used in attacks on transportation and shipping firms in Kuwait
Issue is an embarrassment for Microsoft, whose recent Windows 10 bug-fixes have been plagued with problems of their own
Attack that began in July takes on new form as hackers begin creating rogue administrator accounts on unpatched sites