Palo Alto Networks eyes rise to the top with 2015 billings growing 58 percent year-over-year
Dropbox now supports USB U2F two factor authentication to protect users from phishing during the login process
Lenovo firmware on laptop motherboards was not only irremovable but also posed a security risk
Adobe's August Patch Tuesday update provides fixes for 34 identified Common Vulnerabilities and Exposures (CVEs)
Search engines, social networks and e-commerce websites will have to comply with EU security measures
The single most pervasive zero-day is use-after-free (UAF), but new research from HP detailed at Black Hat could change that…
At the Black Hat show, a security expert demonstrates how vulnerable SDN switches that use the ONIE software are open…
Google's bring your own keys program marries cost benefits of public cloud computing with robust encryption security, the company says
On-premise cyber security platform will feature social media-style timeline and use machine learning to outwit the hackers
Cyber-security firm backed by former Autonomy boss Mike Lynch hits new high
Google publishes open letter to the US Bureau of Industry and Security objecting restrictions slapped on the export of cybersecurity…
Hardware for attacking computers via Wi-Fi caught the attention of a Boeing defense subsidiary, which wanted to use its drones…
Microsoft moves to buy Israeli cloud security firm for £205m
Upgrade now or face being overrun by criminals with more advanced tools, RAND report warns businesses
BAE Systems Applied Intelligence announces cloud-based cyber security tools for commercial organisations
It's good to talk - IBM initiative aims to help companies share their cyber security experiences
Hackers launching a increasing mix of old and new style attacks, Trend Micro survey finds
New hacker collective is snooping on government, civil and military targets in a number of Asian countries
Expedition to Eastern Europe examines ways to combat growing cyber threat from Russia
Cisco makes play in defence, security and satellite communication market with Airbus partnership
How can an SMB avoid compromising its data? Andrew Thomas from CSID says it boils down to four easily digestible…
Proposed law to allow American companies to share cybersecurity threats with government, without being sued
Plans for a Europe-wide counter-terrorism unit are being considered to tackle Jihad John and his pals
American student tests his cyberskills with hack of high school network to bolster exam results
Cybercriminals using phishing techniques to exploit router vulnerabilities, including weak passwords
Hackers increasingly went mobile last year, with Point of Sale terminals also key targets, Trend Micro report reveals
Announces US 'safety net' to reduce the risk of fraud or cyberattacks
New Facebook platform to allow professionals to share threat data to help bolster cyber security
Government IT leader will leave post as MP for Horsham at the next election
GreatFire.org points finger at Cyberspace Administration of China