cyber security

Visit/security/cyber-security/354284/labour-mp-targeted-by-russian-phishing-campaign
cyber security

Labour MP ‘targeted by Russian phishing campaign’

Putin critic claims he received malware-loaded documents that claimed to reveal disinformation efforts
5 Dec 2019
Visit/security/cyber-security/354246/millions-of-text-messages-leaked-through-exposed-truedialog-server
cyber security

Millions of text messages leaked through exposed TrueDialog server

Database of 604GB included unencrypted passwords and the contents of SMS messages
2 Dec 2019
Visit/security/trojans/354242/national-crime-agency-brings-down-prolific-trojan-marketplace
Trojan
trojans

National Crime Agency brings down prolific Trojan marketplace

Imminent Methods sold IM-RAT malware for as little as $25
2 Dec 2019
Visit/security/cyber-security/354224/security-flaws-prevalent-in-applications-produced-by-software
cyber security

Security flaws prevalent in applications produced by software vendors

Secure development is the key to a secure application
29 Nov 2019
Advertisement
Visit/security/cyber-security/354226/how-to-build-an-effective-cyber-resilience-strategy
Whitepaperwhitepaper

How to build an effective cyber resilience strategy

Don’t let your organisation be caught unprepared
29 Nov 2019
Visit/business-strategy/startups/354216/gitguardian-the-security-startup-hunting-down-online-secrets-to
startups

GitGuardian, the security startup hunting down online secrets to keep companies safe from hackers

More than 3,000 company credentials unwittingly end up online everyday. GitGuardian helps firms plug these leaks
29 Nov 2019
Visit/security/cyber-security/354211/cyber-security-skills-shortage-near-breaking-point
cyber security

Cyber security skills shortage near breaking point

A lack of government interest and Brexit is widening the skills gap, say UK IT decision-makers
27 Nov 2019
Visit/security/data-breaches/354192/t-mobile-data-breach-affects-more-than-a-million-users
data breaches

T-Mobile data breach affects more than a million users

The company has given no indication as to whether any personal information has been stolen
25 Nov 2019
Visit/security/bugs/354180/google-to-offer-15m-to-anyone-that-can-break-a-pixel-4
bugs

Google to offer $1.5m to anyone that can break a Pixel 4

In a bid to make its Titan technology more secure, Google takes a page out of Apple's playbook
22 Nov 2019
Advertisement
Visit/security/cyber-security/354174/biometric-data-leaks-and-targeted-ransomware-to-dominate-2020-threat
cyber security

Biometric data leaks and targeted ransomware to dominate 2020 threat landscape

Expect attackers to go after devices previously overlooked
21 Nov 2019
Visit/security/ransomware/354171/microsoft-issues-statement-debunking-teams-ransomware-rumours
Ransomware splash screen mockup
ransomware

Microsoft issues statement debunking Teams ransomware rumours

Rumours also claimed ransomware was being installed via the BlueKeep exploit
21 Nov 2019
Advertisement
Visit/security/cyber-security/354128/understanding-your-open-source-risk
cyber securitywhitepaper

Understanding your open source risk

Open source libraries can introduce vulnerabilities to your code
19 Nov 2019
Visit/security/cyber-security/354127/report-the-state-of-software-security
cyber securitywhitepaper

Report: The State of Software Security

This annual report explores important trends in software security
19 Nov 2019
Visit/security/cyber-security/354123/how-do-vulnerabilities-get-into-software
cyber securitywhitepaper

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software
19 Nov 2019
Visit/security/cyber-security/354118/application-security-fallacies-and-realities
cyber securitywhitepaper

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?
19 Nov 2019
Advertisement
Visit/encryption/34832/interpol-to-support-the-breaking-of-end-to-end-encryption
encryption

Interpol to support the breaking of end-to-end encryption

Law enforcement agency argues the technology frustrates the investigative process
18 Nov 2019
Visit/policy-legislation/34834/us-huawei-ban-to-be-postponed-for-another-three-months
Policy & legislation

US Huawei ban to be postponed for another three months

Extension will be the third reprieve since the embargo was issued
18 Nov 2019
Visit/data-insights/analytics/354044/leveraging-advanced-analytics-to-detect-user-security-threats
analyticswhitepaper

Leveraging advanced analytics to detect user security threats

Deliver a unified, contextual, and secure digital workspace
15 Nov 2019
Visit/technology/34817/djis-rogue-drone-app-helps-pinpoint-a-pilots-precise-location
Technology

DJI's rogue drone app helps pinpoint a pilot's precise location

App is dismissed by experts as being insufficient for fighting illegal drone use
14 Nov 2019
Visit/cyber-security/34815/home-office-app-for-eu-citizens-vulnerable-to-hackers
cyber security

Home Office app for EU citizens vulnerable to hackers

'Little technical skill' needed to breach app built to help EU nationals settle in the UK
14 Nov 2019
Visit/cyber-security/34809/trickbot-trojan-named-the-most-dangerous-threat-to-healthcare
cyber security

TrickBot trojan named the most dangerous threat to healthcare

A lack of funding and legacy technology has led to the growing severity of healthcare's security landscape
13 Nov 2019
Advertisement
Visit/ransomware/34808/ransomware-as-a-service-threat-targeting-enterprise-servers
ransomware

‘Ransomware as a service’ threat targeting enterprise servers

The PureBasic-written malware is highly unconventional and has ties to well-known organisations
13 Nov 2019
Visit/cyber-security/34806/facebook-fixes-ios-1322-bug-that-launched-users-cameras-without-authorisation
cyber security

Facebook fixes iOS 13.2.2 bug that launched users' cameras without authorisation

The issue has angered users who think the company is exploiting the app to spy on them
13 Nov 2019