Europol has taken down the WebStresser service, one of the biggest DDoS-for-hire portals, as part of Operation Power Off
The High Court has ruled that the controversial Investigatory Powers Act (2016), also known as the Snoopers’ Charter, is illegal and must be amended.
Uber suffers 57 million record data breach, then pays hush-money to prevent disclosure to customers in shocking cover-up that has now been exposed
The Cybersecurity Information Sharing Act (CISA) bill has been passed by the US Senate. But what is CISA, why does it matter to everyone who uses the Internet and what does the IT security industry have to say about it?
Human vulnerabilities exist within every organisation, and social engineering exists to find and exploit them.
Trojanised, auto-rooting adware attacks Android phones, installs itself as a system app and can survive a factory reset
If you want to get a real-world handle on how the cybersecurity threatscape is being shaped, and therefore understand both threat evolution patterns and the best methods to mitigate against the resulting attacks, quarterly research reports are your best bet.
We get inside the tale of the iOS SideJacking app vulnerability that Apple knows about but hasn’t patched yet. Are you sitting comfortably? Then we’ll begin.
It may have been world password day recently, but people need to do more to up their own security settings.