Source: computing.co.uk

Facebook Privacy Loophole Allowed Personal Data of 'Closed' Group Members to be Downloaded

Facebook Privacy Loophole Allowed Personal Data of 'Closed' Group Members to be Downloaded

The ICO has only collected half of data breach fines since 2010

The ICO has only collected half of data breach fines since 2010

Nest warns user of password breach - but not from its own systems

Nest warns user of password breach - but not from its own systems

US blocks Broadcom acquisition of Qualcomm citing national security

US blocks Broadcom acquisition of Qualcomm citing national security

Security researchers identify new vulnerability affecting Pivotal Spring projects

Security researchers identify new vulnerability affecting Pivotal Spring projects

Adobe finally responds to claims of North Korean hackers exploiting Flash zero-day for TWO MONTHS

Adobe finally responds to claims of North Korean hackers exploiting Flash zero-day for TWO MONTHS

Cyber crooks are using HTTPS domains to deceive users

Cyber crooks are using HTTPS domains to deceive users

Researchers identify a new data-compromising Trojan that spies on Windows clipboard

Researchers identify a new data-compromising Trojan that spies on Windows clipboard

Government-led Cyber Discovery programme gets 20,000 student sign ups in just six weeks

Government-led Cyber Discovery programme gets 20,000 student sign ups in just six weeks

Google told chipmakers about Spectre and Meltdown vulnerabilities last summer

Google told chipmakers about Spectre and Meltdown vulnerabilities last summer

Britain's undersea internet links can be attacked

Britain's undersea internet links can be attacked

US-CERT warning over security vulnerabilities found in Apple MacOS and iOS

US-CERT warning over security vulnerabilities found in Apple MacOS and iOS

Lifelock attempts to capitalise on Equifax attack

Lifelock attempts to capitalise on Equifax attack

Author of BrickerBot Declares Two Million Bricked IoT Devices

Author of BrickerBot Declares Two Million Bricked IoT Devices

 Malwarbytes: Cyber Criminals are Turning to Ransomware and Mac Malware

Malwarbytes: Cyber Criminals are Turning to Ransomware and Mac Malware

Shadow Brokers' Malware Release Includes Oracle Solaris Security Defect

Shadow Brokers' Malware Release Includes Oracle Solaris Security Defect