Pwn2Own 2019 contestants share a total of $315,000 in this year's Pwn2Own contest in Tokyo with Team Fluoroacetate crowned 'Master of Pwn'
Majority of customers don't have access to their data yet
Amazon patches Ring Video Doorbell vulnerability that could allow hackers to breach owner's Wi-Fi network
Ring vulnerability attributed to device's use of insecure HTTP rather than encrypted HTTPS
BlueKeep exploit attempts are increasing, warns Microsoft, and the worst is still to come
Trend Micro confesses to compromise that led to user account details finding their way into the hands of a criminal third party
Morrisons tells Supreme Court that it should not be held vicariously liable for payroll data leak by senior IT internal auditor Andrew Skelton
The Facebook documents were leaked from a civil suit against Facebook
One former Twitter employee arrested on Tuesday in Seattle - form Facebook chief security officer Alex Stamos warns that there will be more
DevOps is designed to bring developers and operations more closely together. Ahead of Cyber Security Live later this month, Nic Fearn asks: Can it also encompass security as well?
DarkUniverse developed its full-featured malware from scratch but went quiet shortly after the Shadow Brokers leak
Ahead of Cyber Security Live later this month, Nic Fearn asks: With cyber crime rocketing, who in your organisation should have ultimately 'ownership' of IT security?
The researchers claim that virtually any device featuring a microphone and voice-control software could be hijacked
Deal to close before the end of the year
Google's quantum supremacy is real. Now we urgently need quantum-safe encryption, says UKNQT's Sir Peter Knight
'There's a lot at stake in rewiring the world in terms of encryption and we all depend on getting it right'
New Bluekeep exploit picked-up by security specialists 'Bluepot' honeypot network
Number of US suppliers to Huawei "frankly more than we would've thought", admits Ross
The idea behind Berners-Lee's Inrupt is to flip the rules of who controls data on the web
The attack caused a disconnection between the power provider's main command centre and power generation installations
After gaining access to a device, the malware injects malicious code into the firmware to gain persistence
ICO calls for a statutory code of conduct to stop police misuse of live facial recognition technology
Chinese intelligence targeting 'upstream data entities', such as telecoms companies, in order to compromise world leaders' communications
"Internet political ads present entirely new challenges to civic discourse," CEO Jack Dorsey declares in 'sub-tweet' aimed at Facebook's Mark Zuckerberg
'They didn't think anyone would hack us - 10 months later we suffered a data breach' - Racing Post CISO Johan Pieterse
Racing Post's Johan Pieterse, later appointed CISO, was told 'no-one would want to hack Racing Post'
Critical internal network of the plant remained safe from the malware, the company claims