China leads the hacking charts with the highest combination of impact factors ticked off on a matrix combining the potential capability and impact of possible attacker groups, thus presenting the highest risk.
Spanish researchers are developing a tool that will scan smartphones for 'electromagnetic emanations' that could be used to obtain encryption keys as part of an attack.
A letter written on behalf of a former Uber employee contains allegations that the transportation company illegally hacked and surveilled its competitors.
A tech CEO noticed the free Wi-Fi at his local Starbucks didn't exactly come without a price after discovering the network was secretly jacking his computing power to mine crypto-currency.
In the mid-season finale of Grey's Anatomy, titled "Out of Nowhere," Grey-Sloan Memorial Hospital itself was on life support after its network became infected with ransomware - how realistic was the portrayal?
A legal precedent will be set over the extradition of Lauri Love, a man with Asperger's accused in the US of hacking government computer systems, when a decision is made following presentations being made in the UK high court.
A group of UK MPs has beseeched Prime Minister Theresa May to block the extradition of hacker Lauri Love to the US, saying they fear for his mental health.
Richard Moulds takes a look behind recent crypto vulnerability headlines - the ability to calculate the private key of an RSA keypair purely by knowing the public key - and asks if they are a prelude to a 'cryptoapocalypse'.
The password on its own is not enough to protect an organisation's data, even if you follow best practice says Kevin Timms, adding passwords that are easily entered and remembered are inherently weak and easily compromised.
Companies seem to be slow to realise that their Twitter, Facebook or LinkedIn accounts and passwords require exactly the same protection as any of their high-risk or high-value internal systems says Jackson Shaw.
The founder of a professional networking site was sentenced to a year and one day in prison after hacking into a competitor's database and attempting to sell his site to the same company whose database he hacked.
A webshell used to harvest credentials from an unnamed Middle Eastern organisation appears to be targeting Israeli institutions and may possibly be linked to the Iranian APT group OilRig.
Researchers have demonstrated a way for remote attackers to exfiltrate data from and send malicious commands to air-gapped networks, using infrared surveillance cameras.
In Case You Missed It: Facebook spreads malware; Instagram celeb hack; Logon breach id key; Spambot weaponises 711 m accounts; CeX hacked
Hackers leak more celeb nude pics - Dakota Johnson joins former sports couple Tiger Woods and Lindsey Vonn, actress Kristen Stewart, performers Miley Cyrus and Katharine McPhee, and model Stella Maxwell.
Cyber-attack on photovoltiac panels could bring down power and have a domino effect on the rest of the electricity supply, both nationally and potentially, continentally.
Is Malwaretech, aka Marcus Hutchins, innocent? The FBI says Hutchins wrote the code for the Kronos banking Trojan. Without seeing all the evidence from both sides, it's impossible to know for sure.
Older versions of Amazon Echo are vulnerable, and though physical access to the device is needed, this is more achievable with second hand devices.
It looks like China is the latest to apply quantum cryptology to create a supposedly unhackable network. But just how valid are these claims?
The group is known for attacking government, security and academic institutions around the world.
Research shows most security pros would disable security to allow employees more freedom to get their work done.
The agreement follows a number of high profile cyber-attacks on banking systems around the world, which has brought banking security to the top of the agenda.
The head of the UK's National Cyber Security Centre has written to political parties warning of potential Russian-backed hacking to sway the British electorate.
Hacking tools from the isolated, high-security network situated inside the CIA's Centre for Cyber Intelligence have allegedly been released by Wikileaks who hope to instigate conversation around the moral use of cyber-weapons.
A spamming group called River City Media, led by well-known spammers Alvin Slocombe and Matt Ferris, has had its database of 1.4 billion records leaked.
A plethora of vulnerabilities across multiple models and brands of robots is leaving cyber-security experts scratching their heads, wondering why we are making the same old mistakes again.
The mobile forensics company Cellebrite is slowly catching up with its abilities to exfiltrate data from mainstream mobile phones, and has come under criticism for selling its technology to autocratic regimes.
Freedom Hosting II, a major Dark web host has been hacked, resulting in 381,000 user emails leaking onto the public internet.
Cyber-security blogger Brian Krebs spoke at Microsoft BlueHat IL on the psychology of the modern-day supervillain hacker and outlining key threats.