Google denies whistleblower claims that it plans to "mine patient information" and "sell or share data with third parties"
Cloudflare and the NCSC play down the scale of the 'large and sophisticated' DDoS attack on the Labour Party
Magento users advised to install latest update to thwart attacks exploiting remote code execution security flaw
The security flaw enables attackers to inject a malicious payload into a merchant's website site
The risks of cyber attack are more than doubling every year. So should CIOs and CISOs rethink how they organise IT security, Nic Fearn asks
Attack may be linked with complaints from activists that the portal for ordering election leaflets had failed
The samples include loaders, backdoors, and backdoor builders
California's new privacy law was approved in June 2018 - in the teeth of opposition from internet companies
Pwn2Own 2019 contestants share a total of $315,000 in this year's Pwn2Own contest in Tokyo with Team Fluoroacetate crowned 'Master of Pwn'
Majority of customers don't have access to their data yet
Amazon patches Ring Video Doorbell vulnerability that could allow hackers to breach owner's Wi-Fi network
Ring vulnerability attributed to device's use of insecure HTTP rather than encrypted HTTPS
BlueKeep exploit attempts are increasing, warns Microsoft, and the worst is still to come
Trend Micro confesses to compromise that led to user account details finding their way into the hands of a criminal third party
Morrisons tells Supreme Court that it should not be held vicariously liable for payroll data leak by senior IT internal auditor Andrew Skelton
The Facebook documents were leaked from a civil suit against Facebook
One former Twitter employee arrested on Tuesday in Seattle - form Facebook chief security officer Alex Stamos warns that there will be more
DevOps is designed to bring developers and operations more closely together. Ahead of Cyber Security Live later this month, Nic Fearn asks: Can it also encompass security as well?
DarkUniverse developed its full-featured malware from scratch but went quiet shortly after the Shadow Brokers leak
Ahead of Cyber Security Live later this month, Nic Fearn asks: With cyber crime rocketing, who in your organisation should have ultimately 'ownership' of IT security?
The researchers claim that virtually any device featuring a microphone and voice-control software could be hijacked
Deal to close before the end of the year
Google's quantum supremacy is real. Now we urgently need quantum-safe encryption, says UKNQT's Sir Peter Knight
'There's a lot at stake in rewiring the world in terms of encryption and we all depend on getting it right'
New Bluekeep exploit picked-up by security specialists 'Bluepot' honeypot network
Number of US suppliers to Huawei "frankly more than we would've thought", admits Ross
The idea behind Berners-Lee's Inrupt is to flip the rules of who controls data on the web