Palo Alto Networks' Unit 42 finds previously unknown tools used in attacks on transportation and shipping firms in Kuwait
Issue is an embarrassment for Microsoft, whose recent Windows 10 bug-fixes have been plagued with problems of their own
Attack that began in July takes on new form as hackers begin creating rogue administrator accounts on unpatched sites
The account was used to broadcast offensive messages to more than four million followers following a hack of Dorsey's mobile…
Seattle resident seen as presenting a flight risk and a threat to herself and others following breach that affected 106…
Norwich 19-year-old found to have made hundreds of thousands of pounds in Bitcoin from selling compromised personal data and on-demand…
Malware found in 85 apps posing as games or photography utilities displays full-screen ads and takes 'unique' steps to avoid…
Prolific cyber-espionage group uses polymorphic malware in targeted phishing emails, making threats more difficult to defend against
Canary Wharf also said to be considering private face recognition trials, in spite of controversy over police use of the…
Hybrid cloud security is vital as enterprises continue to develop their hybrid cloud services, since more sensitive information has the…
Weeks after Symantec walked away after price disagreement, reports suggest the two are close to a deal
Site goes offline following involvement in shootings in Texas, with Cloudflare accusing it of 'directly inspiring tragic events'
Bugs in GeForce, Quadro, NVS, and Tesla drivers could allow local code execution, denial of service or escalation fo security…
Attacks seeking to wreak havoc on targets' systems have risen sharply, with the manufacturing sector accounting for half of all…
Small security key connects via Bluetooth or USB, and is designed to bolster two-factor authentication efforts for consumers
Tests of drone-based medical delivery system halted after delivery drone's parachute malfunctions, causing it to crash 50 yards from group…
Bugs discovered by Google's Project Zero can be exploited with no user interaction to execute malicious code - with one…
Revenues jumped by 23 percent and smartphone sales by 24 percent in the first half, ahead of US blacklist move…
Using an interception device, researchers trick cards, terminals and mobile wallets into making payments over the limit with no additional…
MyDoom worm disabled Google 15 years ago and continues to take over more computers via infected emails, finds Palo Alto…
Facebook's own platforms found to be used in scams related to Libra cryptocurrency, adding to regulatory pressure over the controversial…
NCSC security agency stops phishing scams and helps reduce online fraud impersonating HMRC as part of 'active' cyber defence programme
Committee finds Chinese gear could be safely allowed in some areas of 5G networks, but says there may be 'geopolitical…
As enterprises continue to develop their hybrid cloud architectures, more sensitive information has the potential to become exposed. Learn about…
The NHS requires 'urgent' investment into cyber-security, with security built into new technologies from the beginning, say Imperial College London…
The fine, intended to penalise 'poor security arrangements' that allowed the attack to take place, is the largest ever announced…
Phishing and ransomware top the list of cyber-attacks reported to the Financial Conduct Authority amidst stricter transparency requirements
Four postal warehouses were evacuated on Monday after parcel erroneously tested positive for sarin nerve agent
Study finds two-thirds of security professionals have considered quitting their jobs or leaving the industry, as skills gap grows
Researchers say an ongoing state-backed hacking campaign has made off with gigabytes of data on targeted individuals