The wizards of Tor are being fed bug reports by anonymous sources inside the agencies normally seen as trying to break its security, the NSA and GCHQ, the Project's executive director Andrew Lewman has claimed in a BBC interview.
The Ministry of Defence (MoD) Centre for Defence Enterprise (CDE) will launch a £1m cyber security competition at an event in London next month.
University researchers have built an Android app that secretly snatches valuable personal data from other mobile apps, such as webmail, shopping and online banking.
Over a thousand major enterprise networks and small and medium businesses in the U.S. have been compromised by a recently discovered malware package called "Backoff" and are probably unaware of it, the U.S. Department of Homeland Security (DHS) said in a cybersecurity alert on Friday.
At the Black Hat security conference in Las Vegas earlier this month, researchers demonstrated how a Nest thermostat can be hacked, to show how easily connected appliances--the household technologies that make up the Internet of Things--can be compromised. When you look beyond the demo's hyperbolic headlines, it turns out the hack requires physical access to the Nest device, but the questions remains, "How vulnerable is IoT?"
All of us lead double lives these days since we both work and play online. During the day you may be working on a company document in Google Drive, while at night you're kicking back and chatting with friends on Skype.
The travel industry and large banks were the US industries most abused by spam and malicious email in the second quarter of 2014, according to Agari's Email TrustIndex.
Is Apple's iMessage the new favorite tool of spammers worldwide? A widely-quoted recent article written by Wired's Robert McMillan suggests it is, even going so far as to claim that iMessage "is being taken over by spammers."
US universities are still battling surprisingly high levels of malware infection among their student populations, mainly old forms considered neutralised years ago such as the Mac Flashback Trojan and Conficker worm, according to security firm BitSight Technologies.
The security breach discovered at a few dozen franchises of the UPS Store, a subsidiary of United Parcel Service, provides a number of lessons for other retailers.
The increased adoption of mobile, social and cloud computing is driving growth in security spending among organizations that are also becoming more aware of threats on all those fronts.
A security precaution skipped in mobile applications such as Facebook's Messenger could be abused to make an expensive phone call at a victim's expense, a developer contends.
Spies and hackers will find it harder to unseal encrypted communications if they’ve already captured packets sent across Amazon’s content distribution network, CloudFront.
It's that time of year again: The wonderful, terrifying week when hackers and security gurus descend upon Las Vegas to show off their skills and unleash presentation after presentation full of scary-sounding exploits. This year is no different. Over the previous week, we've heard tales of planes brought down by rogue code, snoops spying on your security cameras, and secretive, undetectable code that can turn any USB drive into an unstoppable malware vessel.
The U.S. National Institute of Standards and Technology (NIST) is developing a guide for testing third-party apps to ensure that they are secure and don't introduce any vulnerabilities.
City of London Police has enlisted internet security expert Kaspersky Lab to help train its officers to tackle all levels of cybercrime.
U.S government agencies will work to release cyberthreat information faster to the health-care industry after a massive breach at hospital operator Community Health Systems, representatives of two agencies said.
Many businesses spend a lot of time thinking about how to retain and store data, but there's another idea: Think about how to destroy your data.
Advanced persistent threats are on the rise. It is time for CISOs to move beyond the traditional security measures.
University researchers have modified the Android operating system to let developers plug in enterprise-class security enhancements that would normally require overhauling a mobile device's firmware.
Sign up now »
Reduce fraud losses regardless of channel by preventing cybercrime, identity theft, and other threats targeting your customers.
I’m dating myself, but I remember when holiday shopping involved pouring through ads in the Sunday paper, placing actual phone calls from tethered land lines to research product stock and availability, and actually driving places to pick things up. Now, holiday shoppers can do all of that from a smartphone or tablet in a few seconds, but there are some security pitfalls to be aware of.