Facebook exec calls Cambridge Analytica scandal a "non event"
Andrew Bosworth has popped up with another controversial internal memo, this time looking back at media criticism in 2019
Avast and AVG extensions pulled from Chrome
Avast and AVG once again criticised for excessive data collection in security and shopping browser extensions
Sir Tim Berners-Lee champions new rules designed to 'fix the internet'
The internet luminary wants the tech industry and governments to hold each other to account
Thousands infected with malware that 'reinstalls itself'
More than 45,000 Android devices have been affected by the Xhelper malware since March
Humans 'unfit' to handle access managment, say Goldman Sachs
Privileged access management is rarely done well and humans are usually the issue
IoT botnets are on the rise and 5G isn’t helping anything
Botnets are more common and coming in more diverse strains than ever before
NordVPN confirms 2018 data centre breach
Personal virtual private network provider admits to a breach in March 2018 but claims no data was exfiltrated
Five steps to an effective layered defence strategy
Analysing weak spots in an IT system can be challenging, which is why a layered approach is important
Thousands of webcams vulnerable to attack
Exposed connections could lead to loss of privacy or information theft
Modern cyber security bears 'great resemblance to Titanic'
The security head likens the maritime disaster to cyber security blunders and gives his thoughts on how to move forward
What is WannaCry?
The full story behind one of the worst ransomware outbreaks in history
Enterprises urged to scan networks for F5 BIG-IP flaw
Compromised devices are difficult to detect and can act as a springboard for further attacks
Better tech needed to verify digital identities, says UK gov
The tool will build on the government's highly criticised Verify programme
NCSC issues advice for global DNS hijacking campaign
Middle East-based attacks expected to spread to consumers and businesses across Europe
What is ethical hacking? White hat hackers explained
Not all hackers are motivated by greed - some of them use their powers for good
Decade-old flaw in PGP is finally being exploited
It's the Snowden-approved industry standard for secure communications, but hackers have stumbled upon hugely significant flaw
Apache fixes dangerous RCE flaw in Tomcat application server
Vulnerability affects multiple versions of the software running on Windows
Dragonblood flaws discovered in WPA3 Wi-Fi pro
Researchers say these attacks could've been avoided if the Wi-Fi Alliance was more open when creating WPA3
36 vulnerabilities in LTE 4G standard discovered
'Fuzzing' tool used by researchers to find exploits ranging from spoof SMS messages to disconnecting victims from networks
McAfee Internet Security 2019 review: Redemption at last
The old dog has finally learnt some new tricks
Panda Free Antivirus review: Bamboo-zle the hackers
Panda remains our top choice for free AV protection, with a fresh look and less pushy reminders
What was the Morris worm?
One computer science student embarked on an innocent internet experiment that ultimately cemented his place in computing history
Cyber Discovery extends to Scotland and Northern Ireland
Cyber Discovery, a scheme attracting young people into cyber security reaches Scotland and Northern Ireland