David Tinley faces a fine of up to $250,000 and ten years in prison
Warning over VPNs from Palo Alto Networks, Fortinet and Pulse Secure after researchers uncover new security flaw
GitHub Bluekeep explainer significantly lowers the bar for writing malware similar to NotPetya and WannaCry
Exploits expected to emerge within days to take advantage of 9.8-rated critical security flaw in VLC Media Player
Neither Apple nor Microsoft have yet issued a fix
GandCrab gang not retiring, but rebranding to offer a more exclusive, lower profile 'service'
Warning over upsurge in DNS hijacking campaigns that redirect users to malicious websites
US Coast Guard issues alert over rise in cyber attacks targeting commercial vessels
Fifteen of this month's 77 vulnerabilities are rated as 'critical'
Astaroth's 'living off the land techniques' are being used to spread fileless malware
Print editions of a number of Tribune Group titles affected by a targeted campaign
CVE-2018-8653 must be patched manually for now
Critical bug scores 9.8 out of 10 for seriousness. Patches are available.
Attackers often target superuser accounts with access to data and systems - how do you protect them?
The latest methods are designed to manipulate, not destroy, says Darktrace
Mainframe users cited concerns about disruption and end-user resistance as reasons not to employ MFA
University of Birmingham CISO: "I have severe doubts about the security of Facebook, and LinkedIn is going the same way"
The University of Birmingham faces security challenges from the local to the international level
Whether it is because of legal risks, reputational damage or concerns over business continuity, reporting cyber incidents is rare and pursuing them legally is even more so
Communication between the board and IT cannot be solely one way
93 per cent of CEOs store their work on a laptop or other personal device outside of official company storage, finds survey
DerpTrolling 'brains' Austin Thompson faces up to ten years in prison over DDoS campaign
Parents and children must understand how and why data is being collected by toy-makers
The attacks begin with a malicious app that spies on the infected system and steals passwords through GPU rendering
Artificial intelligence will enable threats to learn as they go, remaining undetected for longer