cyber security

What is a web filter?
Computer screen displaying parental controls
cyber security

What is a web filter?

The best ways to block, hide, or flag undesired search engine results
24 Sep 2021
Malware developers create malformed code signatures to avoid detection
Malware in code
malware

Malware developers create malformed code signatures to avoid detection

Google researchers find techniques used to push dodgy software onto unsuspecting victims.
24 Sep 2021
New FamousSparrow hacking group caught targeting hotels
A laptop on a table with the Microsoft Exchange logo displayed
vulnerability

New FamousSparrow hacking group caught targeting hotels

Microsoft Exchange ProxyLogon flaw used in attacks
24 Sep 2021
The new frontier of endpoint management
Green and grey coverwhitepaper
Whitepaper

The new frontier of endpoint management

How analytics and security stacks are driving employee experience initiatives
24 Sep 2021
How to plan for endpoint security against ever-evolving cyber threats
Man and woman looking at a laptop in an office building whitepaper
Whitepaper

How to plan for endpoint security against ever-evolving cyber threats

Safeguard your devices, data, and reputation
24 Sep 2021
Managing security and risk across the IT supply chain: A practical approach
Overlaid images of buildings, a sign saying 'security breach', and yellow text saying 'we have detected a harmful attack attempt'whitepaper
Whitepaper

Managing security and risk across the IT supply chain: A practical approach

Best practices for IT supply chain security
24 Sep 2021
CISA, FBI, and NSA issue a Conti ransomware advisory
FBI, DOJ badge on a crest
ransomware

CISA, FBI, and NSA issue a Conti ransomware advisory

Joint statement with the FBI and the NSA warns of increased attacks from the Conti Ransomware
23 Sep 2021
Minnesota farm coop caught in ransomware attack
Tractor pulling a trailer across a farm
ransomware

Minnesota farm coop caught in ransomware attack

Crystal valley becomes second agribusiness to find data encrypted by criminals
23 Sep 2021
LG continues automotive pivot with $240 million Cybellum acquisition
LG logo on a smartphone display
mergers and acquisitions

LG continues automotive pivot with $240 million Cybellum acquisition

The Israeli startup detects vulnerabilities in automotive hardware and software services using digital twins
23 Sep 2021
Critical flaw in vCenter Server could give hackers infrastructure access
The entrance sign at VMware's headquarters in Palo Alto
vulnerability

Critical flaw in vCenter Server could give hackers infrastructure access

VMware is urging users to patch the 9.8-rated vulnerability as soon as possible
22 Sep 2021
Global security insights report 2021
Whitepaper front coverwhitepaper
Whitepaper

Global security insights report 2021

Extended enterprise under threat
20 Sep 2021
Researchers disclose top flaws abused by ransomware gangs
Ransomware on a red screen
ransomware

Researchers disclose top flaws abused by ransomware gangs

Easy-to-follow list may give organizations time to prepare for ransomware attacks
20 Sep 2021
Victoria launches $50 million cyber strategy
Melbourne skyline looking towards Flinders Street Station
Policy & legislation

Victoria launches $50 million cyber strategy

The Australian state is hoping to bolster its cyber security and develop a more competitive cyber sector
20 Sep 2021
What's the difference between antimalware and antivirus?
Click here for malware
malware

What's the difference between antimalware and antivirus?

We help you navigate the worlds of antimalware and antivirus
17 Sep 2021
How do hackers choose their targets?
An illustration of four cyber criminals stealing money from an online account
hacking

How do hackers choose their targets?

We explore what goes on in the minds of cyber criminals
17 Sep 2021
Free decryptor key for REvil/Sodinokibi ransomware released
An image of a business paying a criminal for a ransom
ransomware

Free decryptor key for REvil/Sodinokibi ransomware released

The key was made possible thanks to a collaboration between law enforcement and Bitdefender
17 Sep 2021
Weekly threat roundup: Microsoft Patch Tuesday, HP Omen, Apple
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
exploits

Weekly threat roundup: Microsoft Patch Tuesday, HP Omen, Apple

Pulling together the most dangerous and pressing flaws that businesses need to patch
16 Sep 2021
Cyber crime in Australia increased 13% in the last year
An image of a digital padlock with code around it
cyber crime

Cyber crime in Australia increased 13% in the last year

The ACSC received one report of a cyber attack every eight minutes in the last financial year
15 Sep 2021
Patch management vs vulnerability management
Plasters over a hard disc drive to symbolise patch management
enterprise security

Patch management vs vulnerability management

What exactly is patch management, and why should IT pros sit up and take notice of doing it properly?
14 Sep 2021
Robust password policies cut cyber attacks by 60%
A list of poorly-constructed passwords on a notepad
cyber security

Robust password policies cut cyber attacks by 60%

Research shows that hackers most often use brute force password attacks and flaw exploitation
13 Sep 2021
Are QR codes safe?
Smartphone scanning a QR code
QR codes

Are QR codes safe?

It’s not so much the safety of the codes themselves, but where they lead to that matter
13 Sep 2021
Olympus hit by suspected ransomware attack
The Netherlands office for Japanese company Olympus
ransomware

Olympus hit by suspected ransomware attack

The former digital camera specialist has shut down its networks in Europe, Africa and the Middle East while it investigates the incident
13 Sep 2021
Medigate and CrowdStrike bolster IoT medical device security
A stethoscope on top of a MacBook keyboard
Internet of Things (IoT)

Medigate and CrowdStrike bolster IoT medical device security

CrowdStrike will integrate its Falcon software with Medigate’s device security platform
10 Sep 2021