Alex Raistrick looks at how criminals are exploiting popular business applications to bypass security
F-Secure shows Xiaomi's RedMi 1S smartphone silently uploads user data to a remote server without asking
Fresh evidence that Bahrain installed FinFisher on 77 computers, including those of lawyers and activists, during 2011 crackdown.
Yahoo will work with Google to bring end-to-end encryption to its mail service this autumn
Hacker redirects bitcoin mining pools to steal a total of $83,000 over a four month period.
Researchers launch Decryptolocker, a free service to unlock files locked by Cryptolocker ransomware
Cyber-attacks on Israel increase 500% as reports suggest a link between Anonymous and Islamist group
US whistleblower Edward Snowden has been granted a three year residence permit by Russia.
A Russian gang amassed 1.2 billion unique online records in "the largest data breach known to date."
Researcher says passenger plane can be hacked using its own Wi-Fi & in-flight entertainment systems
Poweliks does not create files within a computer's hard-driven simply modifying the system registry
Anonymous wages cyber-war on Israel in protest at Gaza attack knocking hundreds of websites offline
The first half of 2014 reported dangerously high levels of Android malware. Out of 24.2 million sample files collected, 2.2 million contained malicious codes/viruses/malware.
Security researchers state that Citadel malware has now been enhanced with the ability to exploit a device remotely, and use the system as host for cyber-crime.
Fake ID has been detected by engineers at Bluebox Labs, and the security hole could open backdoors to multiple security scams resulting in user privacy breach.
BadUSB exploit alters infected USB device firmware and spreads infection undetected to computers.
Former Israeli intelligence officer believes Iron Dome plans stolen by Chinese hackers were just decoys.
Hackers can take over your computer using malware hidden on USB devices and there is currently no fix
Axelos' head of cyber resilience encourages firms stop thinking the buck stops at IT or security
A "backdoor" in iOS caused media hysteria, a public slagging match & finally debate about its meaning
Tor Project says an attack on its network may have revealed users' identities over a five month period
Google has created fix for security flaw discovered by Bluebox research team that could affect millions.
Security expert Brian Krebs reports Beijing-sponsored Comment Crew attacked Israeli defence companies
A UK professor proposes the creation of a personal electronic aura in oder to secure your passwords
Onion ransomware uses the anonymity provided by Tor and bitcoin to cover its creators' tracks
Anonymous knocks Israeli websites offline after one of its members is killed in West Bank
Operation Emmental is a malware campaign targeting Swiss, Swedish and Austrian bank customers.
People preferring to access the web using old versions of Microsoft's Internet Explorer run the greatest risk of being exposed to malware and related scams.
Cyber criminals intensified zero day attacks on Microsoft's browser, during the first half of 2014.
Russia's Interior Ministry wants to identify internet users anonymously surfing the web on Tor.