Cloud security vendor fixes cross-site-scripting bug, downplays the threat, says it would only affect co-workers.
Researcher at the Russia proactive software firm Elcomsoft found that iPhones silently upload call logs to iCloud.
A significant percentage of SMBs are taking advantage of the convenience and cost savings afforded by free cloud storage solutions, according to a new study, but the security of stored information, particularly financial data and health records, could be at risk.
A recent study detected more than 600 cloud repositories hosting malware and other malicious activities on major cloud platforms.
Security researchers discovered a search engine spam campaign that plays on WordPress administrators' use of the XML-RPC infrastructure.
Companies are increasingly willing to migrate their applications, data and processes to the cloud in spite of lingering security concerns, according to a new survey of Canadian senior-level IT practitioners.
A security researcher discovered a severe XSS flaw in code used by the website builder Wix that could cause a worm affecting websites created by users of the DIY website platform.
The long arm of the law isn't so long after all when it comes to hunting cybercriminals, Bradley Barth reports.
Researchers spotted a variant of malware campaign dubbed "CloudFanta" which may have been used to steal 26,000 email credentials
Friday's DDoS attacks that created major website outages across the Internet may prove to be a watershed moment for the Internet of Things industry, after years of warnings - mostly ignored - about the glaring vulnerabilities in IoT devices.
The East Coast was under siege on Friday morning from a large-scale distributed denial of service attack (DDoS) that brought down a number of prominent websites, including Twitter, Spotify, Netflix, GitHub, Amazon and Reddit.
CE2016, the fourth in a semi-annual series of pan-European cyber-security exercises organised by ENISA, has concluded today, bringing to a close six months of activity.
A hacker scanning for unsecured databases has compromised at least 58 million records - and possibly as many as 258 million - from Modern Business Solutions, a data management and monetization firm.
Sixty-two percent of organisations leave data protection and availability of in-cloud data to third-party cloud providers.
Adobe's October Patch Tuesday roll out featured three bulletins covering 84 vulnerabilities for Flash Player, Reader, Acrobat and Creative Cloud Desktop Application with all but one being rated as critical.
Researchers discovered 40 applications in the Google Play store that contain a new family of malware, dubbed DressCode.
OneLogin has confirmed that a bug has allowed a hacker to view some of its customers' encrypted Secure Notes.
Dropbox is being commended by security pros for its handling of a massive data breach that has exposed the login credentials of 68 million users.
A series of flaws affecting the consumer security suite Kaspersky Internet Security was patched by Kaspersky Lab.
While most organizations believe providing workers with the best technology is imperative to business productivity, many struggle to optimize agility owing to traditional security mindsets, according to a new study by Okta.
The world's biggest networking equipment company, Cisco Systems, will layoff about 5.5K employees.
Nearly half of enterprises queried for a Mimecast survey were found to be ill-equipped to deal with threats from insiders.
Researcher accidentally sent solar development device, says he can shut down electricity generation facilities
Security researcher Fred Bret-Mounet found vulnerabilities affecting the management unit on his home's solar array, a device that monitors solar panels over the internet.
USB pens distributed by the U.K.-based mobile network O2 as part of a promotional campaign for an eBook were discovered to contain a "Windows specific virus", according to a company statement.
To enhance the use of its web portal, gov.uk, the U.K. government is testing the use of its subscribers' social media logins as an authentication method.
A malicious spam email campaign discovered by FireEye, used Microsoft Word attachments containing macros that launched a command and control Cerber installers.
Researchers discover a new strain of the Cerber ransomware targeting Office 365 users. The variant is part of an emerging trend of ransomware that targets victims using cloud platforms.