A security researcher has posted a Minecraft flaw that makes it "easy" for hackers to crash the game's servers.
USB Type-C will both charge your laptop battery and offer fast data transfer speeds, but what does this mean for security?
A vulnerability in the Wi-Fi routers used in hundreds of hotels across the world has been uncovered by security researchers, Wired reports.
The US national power grid is subject to physical or online attacks around once every four days, a report by USA Today reveals.
A report suggests that while the number of ships lost at sea is decreasing, cyberthreats are becoming a more pressing issue for the maritime industry.
A hacker going by the name of 'Bitcoin Baron' has issued a threat to the city of Detroit after a Wayne County Circuit Court Judge dismissed a police manslaughter charge.
Security researchers have managed to launch an attack on Linux computers by targeting a physical weakness in some types of DDR memory chips, Ars Technica reports.
A vulnerability in Google Admin that could have allowed domains to be claimed to send out authentic seeming spoofed emails has been patched by the company, reports The Register.
how is 2015 shaping up in security? We caught up with ESET security specialist Mark James to get his take on threats, security and how people should ensure their year is free of malware.
Adobe, the company behind Flash, Photoshop and Adobe Reader, has launched a program encouraging security researchers to find and report possible vulnerabilities to the firm.
A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites has been uncovered by security researchers, reports Ars Technica.
A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World.
What is an exploit and why are they important?
A report by HP has found that 44 percent of all of the breaches in 2014 were caused by known vulnerabilities, between two and four years old.
Possible 2016 Republican presidential candidate Jeb Bush has has had to retroactively redact over 12,000 personal details from emails published in the name of transparency
Google has extended the disclosure period for vulnerabilities uncovered in its Project Zero program by an additional two weeks, if a vendor is planning a patch in the two weeks following the deadline.
Hailed as a panacea by those for whom the world cannot move quickly enough, the Internet of Things has been a long time coming. But is Internet of Things security up to scratch?
We've already looked at online dating scams to be aware of for Valentines Day, but here's some more threats that not-so-special someone could end up sending you, if you're not careful!
Security researchers have uncovered a trojan that evades sandboxes specifically targeted at corporate users, hidden in legitimate looking phishing email that apes Microsoft's Volume License.
The Fancybox plugin for WordPress has been hit by a zero-day exploit that allows hackers to inject malicious code into websites, reports ZDNet.