Human rights group Liberty has raised funds for a judicial review of the controversial web surveillance law.
The Obama-appointed chief information security officer was charged with keeping staff working closely with the President safe from cyber-threats posed by hackers and nation-state attackers.
Homeland security advisor Tom Bossert stands out in Trump's cabinet as a cautious wonk among hotheads. The post Trump's Cybersecurity Chief Could Be a 'Voice of Reason' appeared first on WIRED.
Spammers could have a field day with Gmail users, simply by spoofing real Gmail accounts, according to a security researcher.
The Commissioner wants to see harsher penalties in place for data re-identification, such as a NZ$1 million fine for breaching privacy-related laws.
Losing your iPhone used to be a headache. Just make sure you turn this feature on.
Can an army of bots remove the scourge?
The former contractor reportedly spent 20 years pilfering government secrets and helping himself to the cream of the NSA's hacking tools library.
The deal aims to give Forcepoint customers a clearer view as to how their data is stored and distributed in the cloud -- and how secure it really is.
When Google's cleanup is complete, the platform could be cleansed of millions of half-baked apps which put your privacy and data at risk.
Anyone who searched for "Amazon" were presented the rogue ad that aimed to trick users into falling for a Windows support scam.
For the first time in a year, Hummingbad isn't the most prolific form of malware on mobile devices
Cybercriminals are using legitimate software to collect enterprise passwords and other credentials.
The successful Series C finance round brings the bug bounty platform's funding to $74 million.
The anti-malware provider has been acquired in a deal worth $100 million.
A patched zero-day vulnerability is at fault, but webmasters are not paying attention to updates.
The medical device maker has fixed another Merlin@home Transmitter flaw which makes them vulnerable to cyberattacks.
The Common Criteria (CC) validation follows the NIAP approval for the Android version back in 2015.
The network security firm said ransomware was the payload of choice for malicious email campaigns and exploit kits in 2016, with Locky claiming the title as the most popular payload globally.
Overriding concerns about the scope, burden of proof reversal, criminalisation, and retrospective application of the law, a Senate committee has recommended that the data re-identification Bill be passed.