Trove of stolen Ashley Madison data came from a woman who used to work at Avid Life Media.
NSA warning US firms and agencies to start preparing for quantum computing-resistant cryptography
It is still possible to check whether your details or those of your partner were dumped online.
It is unclear whether the man's suicide was directly linked to the Ashley Madison leak.
Impact Team which hacked Ashley Madison explains its motivation behind the attack.
Scandalous hacks like the security breach of adult website Ashley Madison happened frequently in recent years.
Thermal imaging camera costing under £200 can steal a security code.
Antivirus pioneer McAfee says product that was sold to Intel in 2010 is one of the worst products in the world.
Cybercriminals, probably from China, made use of vulnerability in Microsoft software to create backdoors on infected machines.
Those exposed could face punishment in countries where adultery and homosexuality is illegal.
The hackers who leaked Ashley Madison's customer database have published an even bigger data dump on the dark web
Identity of who hacked Ashley Madison and published the private details of its customers online remains a mystery.
Duggar, who faced a molestation scandal earlier this year, had two accounts with the site.
Hacking collective 'Dad Security' claims responsibility for swatting Mumsnet owner Justine Roberts.
Microsoft issues emergency patch for zero-day flaw in Internet Explorer allowing hackers to control your PC.
A host of email addresses allegedly belonging to members of the British government released.
IRS initially estimated potentially affected accounts at 225,000, including 114,000 successful attempts and 110,000 failed attempts.
Hackers could orchestrate a fireworks display magnificent enough for the entire world to see.
Ukrainian men charged with hacking two newswires to steal non-public data and generate $100m in profit.
Dongle attached to cars for insurance purposes is compromised and gives hackers control of brakes.
HTC phone stored user fingerprints without encryption, putting security of the phone's owner at risk.
Criminals transfer millions of dollars from Hong Kong subsidiary to multiple foreign bank accounts
Researchers targeted drone's gyroscopes with sound frequencies to make them lose control and crash.
Cybercrime has evolved from basic worms to highly sophisticated, nation state-sponsored malware that is almost undetectable.
A new Android vulnerability that is "very easily exploited" allows hackers gain complete control of your smarpthone
Security researchers uncover flaws in Tesla Model S allowing them to remotely shut off the car's systems
Weaponised versions of Facebook, WhatsApp and Skype used to steal sensitive data from non-jailbroken iPhones
Praetorian tracking all IoT devices in Austin, Texas running on ZigBee protocol, similar to the Shodan scanner.
Apple will fix a serious security vulnerability in Mac OS X that can give hackers total access to a system
GE is building the Predix Cloud platform-as-a-service to run industrial Internet of Things devices.