An emerging botnet comprised of compromised IoT devices dubbed "Hide 'N Seek" or HNS is using custom built Peer-to-Peer communication to exploit victims and build its infrastructure.
Vulnerabilities in the group communication protocols of three encrypted messaging apps - WhatsApp, Signal, and Threema - could allow attackers to willfully subvert their integrity and confidentiality.
Backdoor account and blind SQL attacks vulnerability found in AmosConnect 8 satellite comms equipment used in shipping.
The African continent has seen an upsurge in cyber-attacks, particularly on telecommunications infrastructure and especially via DDoS, leading Kenya to set up a new Cyber Coordination Centre.
Flaw in the international communications standard SS7 could allow hackers to mimic users and intercept messages on mobile networks.
In an opinion piece for The Telegraph newspaper, William Hague, the Conservative former Foreign Secretary in the UK, says the latest Brussels terrorist attacks shows the need to crack terrorist communications.
In a hearing before the US House Judiciary Committee, the DoJ addressed its recent efforts to compel technology companies to turn over electronic communications data stored on foreign soil.
A provider of IT infrastructure has called for central government to include local government more in mapping out national cyber-security policies.
Telegram messaging service, which promotes its encrypted communications capabilities, could leak personally identifiable data exposing users to stalkers
Berlin-based secure communications app Telegram found to be playing cat-and-mouse game in a bid to curb extremists accounts.
After a legal challenge by Caroline Lucas MP and Baroness Jones a tribunal has made the "Wilson Doctrine" not legally binding.
A leak, a hack, or a simple mistake can blow up any M&A deal carefully crafted over months or even years, says Stephen Dearing.
A new specially protected communications channel and mobile network is planned for the Ukraine military and government following military losses attributed to intercepted communications.
Cyber communications are vulnerable to both cyber-attack and kinetic attacks on physical infrastructure, with satellites potentially at risk says new report.
Bad news is filtered out of communicaiton to the C-suite and 63 percent of IT staff only start talking after a breach has taken place.
On the night of April 14th, 1912, the RMS Titanic scraped an iceberg and sank to the bottom of the ocean in only two hours and 40 minutes resulting in the death of 1,517 people.
Serious criminals and nation states will increase attacks on communications providers with UK customers if a controversial draft communications law is enacted, according to a Liberal Democrat peer.