Israeli scientists have demonstrated a method to steal data from common routers through blinking lights, but no known malware currently uses this vulnerability.
A possible means to bypass the WannaCry decryption system has been developed by security researchers at McAfee. Here, the creators detail their experimental method.
While patching and software upgrades were still underway in the wake of the WanaCryptOr attack, reports of variants began appearing
A cyber-espionage group dubbed APT32 is carrying out intrusions into private sector companies across multiple industries.
When security researcher Tavis Ormandy revealed a vulnerability in Microsoft's Malware Protection Engine, he published proof-of-concept code and earned himself a rebuke from Graham Cluley.
Conventional anti-virus and sandboxing solutions are no longer effective defences against malicious email attachments, but relying upon employees doesn't work for companies either.
In Case You Missed It: Skype flaw Spyke; Nomx claims nixed; Linux law refuted? Locky's return; LDAP DDoS vector
Three-quarters of breaches are down to outsiders and a quarter to insiders, and 73 percent are conducted for financial reasons with half involving organised crime says latest Verizon report.
A research report published by CGI claims to have been able to measure for the first time the impact that major cyber-incidents have on share prices - and it says it's getting worse.
New research into the security of robots and the software that controls them suggests that vulnerabilities could pose a serious risk to life and property.
Researchers find "missing link" in malware attack on Gulf states - explain how initial compromise escalates to wiping computer hard drives across an organisation.
SophosLabs' 2017 Malware Forecast highlights the areas that cyber-criminals will focus on in the coming year including IoT, MacOS, Linux and IoT.
An unnamed University was attacked by some 5,000 campus devices from its vending machines to light sensors, "and all IOT devices" .
Technology in development that is designed to stop malicious hypervisors from reading and writing protected data in virtualised environments may not work as intended, researchers say.
Second annual international survey of information security professionals finds global confidence in ability to accurately assess cyber-risk dropped 12 percentage points over 2016.
Study reveals 48 percent of people will close accounts following a data breach.
An open port linked to remote management software on Eir's D1000 modem router can allow an attacker to take over consumers' networks.
Italy is measured and found wanting in a country report produced by the author of the Cyber Readiness Index 2.0 which aims to benchmark the major economies of the world.
Professor Mark Ryan takes the HP Chair in Cyber Security at the University of Birmingham to explore security issues where the digital and physical world blur.
Cyber-crime growth is accelerating. Rob Wainwright reports how Europol's 2016 Internet Organised Crime Threat Assessment identifies an expanding cyber-criminal economy exploiting our increasingly Internet-enabled lives.
Researchers have uncovered security vulnerabilities in an insulin pump that had the potential to cost lives. SC asks if medical hardware device vulnerabilities are purely a technical problem, or whether a culture of insecurity is to blame...
Information Security Forum managing director Steve Durbin sat down with SCMagazine.com executive editor Teri Robinson to discuss how organisations can better protect their mission critical information assets.
Including fraud in the UK crime figures resulted in online crime overtaking physical crime, now Financial Fraud Action UK (FFA UK) reports that fraud in the payments sector has jumped 53 percent over last year.
Google is refusing to patch an alleged faulty Login Page after an independent researcher claimed to have spotted a bug.
Distributed Denial of Service (DDoS) attacks are on the up according to new research; and the UK is firmly in the crosshairs.
Apple is offering up to $200,000 to researchers reporting critical security vulnerabilities in Apple software, including its underlying operating system.
Steganographic subterfuge: ransomware was already 'a thing', now it's a mature and established business model
New research claims to show that up to three percent of hidden services directories, the backbone of the Tor anonymous router system, have been compromised, which could enable the identification of users in some cases.
Privacy vs security is a contradiction in terms, according to the European Data Protection Supervisor Giovanni Buttarelli who has been reaffirming his opposition to encryption backdoors.
By analysing changes in files, security researchers believe they have discovered a way to detect ransomware in the early stages of encrypting your data.