cyber security

Visit/security/cyber-security/354980/vodafone-launches-critical-infrastructure-managed-security-service
cyber security

Vodafone launches critical infrastructure managed security service

The move comes after UK companies reported a 16% rise in cyber incidents
12 Mar 2020
Visit/mobile/5g/354966/huawei-commons-5g-rebellion-marred-by-groundless-accusations
Huawei shop
5G

Huawei: Commons 5G rebellion marred by groundless accusations

PM narrowly wins the vote to continue using Huawei equipment in UK's 5G network
11 Mar 2020
Visit/business-strategy/digital-transformation/354957/allsaints-tackles-malicious-bots-with-netacea
digital transformation

AllSaints tackles malicious bots with Netacea machine learning tech

The UK-based global fashion brand is undergoing a significant digital transformation programme
10 Mar 2020
Visit/business-strategy/mergers-and-acquisitions/354941/panda-security-to-be-acquired-by-watchguard
mergers and acquisitions

Panda Security to be acquired by WatchGuard

The deal will see technology from both companies merge into a single brand platform
9 Mar 2020
Advertisement
Visit/security/cyber-security/354931/intel-unable-to-fix-critical-hardware-encoded-cpu-flaw
cyber security

Intel ‘unable to fix’ critical hardware-encoded CPU flaw

Critical flaw affecting recently-released chips is said to be "exactly what security specialists feared the most"
6 Mar 2020
Visit/policy-legislation/data-protection/354922/150000-boots-advantage-card-accounts-affected-by-password
data protection

150,000 Boots Advantage Card accounts affected by password stuffing

The company's IT team discovered "unusual activity" on numerous accounts
5 Mar 2020
Visit/security/cyber-security/354918/4-quick-tips-to-create-an-unbreakable-password
cyber security

4 quick tips to create an unbreakable password

Sink password pirates with these password-creation tips.
5 Mar 2020
Visit/security/malware/28083/the-five-best-free-malware-removal-tools
Click here for malware
Security

Best free malware removal tools 2019

Worried your device is infected? Here are the best free tools you need to get rid of malicious software
2 Mar 2020
Visit/security/data-breaches/354856/uk-financial-regulator-rocked-by-self-inflicted-data-breach
data breaches

UK financial regulator rocked by self-inflicted data breach

The FCA accidentally disclosed confidential information of 1,600 people who complained against it
25 Feb 2020
Visit/security/cyber-security/354855/flaw-in-paypals-google-pay-integration-leading-to-suspected-fraud
cyber security

Flaw in PayPal’s Google Pay integration leading to suspected fraud

Hackers can exploit a virtual credit card within phones to make rogue transactions without authorisation
25 Feb 2020
Advertisement
Visit/security/unified-threat-management-utm/354852/sophos-xg-135w-rev-3-review-the-full-package
unified threat management (UTM)

Sophos XG 135w Rev. 3 review: The full package

Exceptional wired and wireless security, teamed up with great performance and remote management
25 Feb 2020
Visit/security/unified-threat-management-utm/354850/watchguard-firebox-t70-review-compact-but-capable
unified threat management (UTM)

WatchGuard Firebox T70 review: Compact but capable

Top performance and a great set of security and management options
24 Feb 2020
Advertisement
Visit/business/business-strategy/354844/panel-profile-just-eat-ciso-kevin-fielder
Business strategy

Panel Profile: Just Eat CISO Kevin Fielder

We get face-to-face with one of the IT Pro Panellists
24 Feb 2020
Visit/security/cyber-security/354827/mcafee-researchers-trick-tesla-autopilot-with-a-strip-of-tape
cyber security

McAfee researchers trick Tesla autopilot with a strip of tape

The hack caused Tesla’s 2016 Model X to speed fifty miles per hour faster than intended
21 Feb 2020
Visit/security/data-breaches/354825/white-house-security-agency-rocked-by-data-breach
data breaches

White House security agency rocked by data breach

The personal details of 200,000, including social security numbers, were compromised in 2019
21 Feb 2020
Visit/security/cyber-security/354512/boris-johnson-wants-us-to-suggest-an-alternative-to-mad-huawei-5g
cyber security

Boris Johnson wants US to suggest an alternative to ‘mad’ Huawei 5G tech

However, the PM doesn't want any decision to impact US-UK relations
20 Feb 2020
Advertisement
Visit/security/cyber-security/354818/uk-among-countries-most-likely-to-encounter-cloud-attacks
cyber security

UK among countries most likely to encounter cloud attacks

Ireland most cyber-secure country in Europe despite only one in four senior business leaders being confident they can respond to any security incident…
20 Feb 2020
Visit/technology/cryptocurrencies/354811/how-safe-are-cryptocurrencies
cryptocurrencies

How safe are cryptocurrencies?

Their use of blockchain and anonymity of transactions may make digital currencies seem safe, but hidden weaknesses lurk below the surface
20 Feb 2020
Visit/security/cyber-security/354787/mastercard-bolsters-fraud-fighting-with-europe-cyber-resilience
cyber security

Mastercard bolsters fraud fighting with Europe Cyber Resilience Centre

US payments giant looks to shore up European banks and fintech with Belgium-based security hub
17 Feb 2020
Visit/business-strategy/risk-management/354778/digital-risk-report-2020
Whitepaperwhitepaper

Digital Risk Report 2020

A global view into the impact of digital transformation on risk and security management
14 Feb 2020
Visit/security/cyber-security/354776/google-purges-500-harmful-chrome-extensions-from-its-web-store
Chrome browser logo
cyber security

Google purges 500 harmful Chrome extensions from its Web Store

The extensions injected aggressive, infectious advertisements into millions of users’ browsers
14 Feb 2020
Visit/security/enterprise-security/354772/the-it-pro-podcast-breaking-out-of-the-security-bubble
enterprise security

The IT Pro Podcast: Breaking out of the security bubble

Just Eat CISO says Infosec professionals need to stop preaching to the choir
14 Feb 2020
Advertisement
Visit/security/cyber-security/354770/ensuring-cyber-security-during-mergers-and-acquisitions
cyber security

Ensuring cyber security during mergers and acquisitions

A lack of due diligence when bringing two companies together can lead to major IT and security issues down the line
13 Feb 2020
Visit/network-internet/internet-of-things-iot/354725/why-the-internet-of-things-needs-security-by-design
Internet of Things (IoT)

Why the Internet of Things needs security by design

As adoption of connected devices skyrockets, technology manufacturers hold an increasingly important role in defending against security threats
7 Feb 2020
Advertisement