endpoint security

Visit/acquisition/34287/carbon-black-execs-reveal-post-acquisition-plans
Acquisition

Carbon Black execs reveal post-acquisition plans

Security firm's CEO and CTO talk integration, growth and Gelsinger
28 Aug 2019
Visit/security/34226/knob-attack-lets-hackers-insert-themselves-into-your-bluetooth-calls
Security

KNOB attack lets hackers listen in on your Bluetooth calls

Vulnerability allows attackers to ‘completely break’ Bluetooth encryption
16 Aug 2019
Visit/hacking/30282/what-is-ethical-hacking-white-hat-hackers-explained
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
11 Jul 2019
Visit/security/endpoint-security/354376/building-the-business-case-for-improving-endpoint-security
endpoint securitywhitepaper

Building the business case for improving endpoint security

Tools to convince executives it's worth the investment
10 Jul 2019
Advertisement
Visit/security/33946/50-of-cyber-attacks-now-use-island-hopping
City office buildings image with overlay of security padlocks and network showing a data breach
Security

50% of cyber attacks now use island hopping

Financial, retail and manufacturing businesses are in the firing line of this increasingly popular cyber attack method
3 Jul 2019
Visit/botnets/33799/goldbrute-botnet-targeting-windows-rdp-systems-in-brute-force-hacking-spree
Botnet graphic
botnets

GoldBrute brute force botnet targeting Windows RDP systems

More than 1.5 million unique IP addresses have been compromised with the figure only expected to rise
7 Jun 2019
Visit/security/endpoint-security/354347/unified-endpoint-management-in-the-cloud
endpoint securitywhitepaper

Unified Endpoint Management in the cloud

How UEM will help you be competitive in the long term
31 May 2019
Visit/security/endpoint-security/354103/exposing-the-threat-of-shadow-devices
endpoint securitywhitepaper

Exposing the threat of shadow devices

Do you know what’s lurking on your network?
7 May 2019
Visit/endpoint-security/33558/kaspersky-endpoint-security-for-business-advanced-review-on-prem-security
endpoint security

Kaspersky Endpoint Security for Business Advanced review

Excellent device protection for modern businesses
1 May 2019
Visit/security/endpoint-security/354091/printer-security-the-new-it-imperative
endpoint securitywhitepaper

Printer security: the new IT imperative

When organisations secure their endpoints, they often forget one of their most vulnerable: printers
18 Apr 2019
Advertisement
Visit/endpoint-security/33436/three-ways-to-secure-your-printer
Man selecting options on a printer using authentication for printer security
endpoint security

Three ways to secure your printer

Your office printer is a sitting target for hackers, so what can you do to secure it?
11 Apr 2019
Visit/security/33393/samsung-galaxy-s10-s-ultrasonic-sensor-fooled-by-fake-finger
Security

Samsung Galaxy S10’s ultrasonic sensor fooled by fake finger

Samsung’s in-display fingerprint reader can be hacked ‘in 15 minutes’
5 Apr 2019
Advertisement
Visit/endpoint-security/32733/is-your-weakest-link-really-where-you-think-it-is
Blue digital chain with a weak link exploding on a dark background
endpoint security

Is your weakest link really where you think it is?

Hacking is a reality of modern business life but that doesn’t mean you have to admit defeat just yet…
20 Mar 2019
Visit/security/33182/mcafee-internet-security-2019-review-redemption-at-last
Security

McAfee Internet Security 2019 review: Redemption at last

The old dog has finally learnt some new tricks
8 Mar 2019
Visit/security/33162/panda-free-antivirus-review-bamboo-zle-the-hackers
Security

Panda Free Antivirus review: Bamboo-zle the hackers

Panda remains our top choice for free AV protection, with a fresh look and less pushy reminders
6 Mar 2019
Visit/microsoft-windows/33090/microsoft-makes-windows-defender-atp-available-for-windows-7-and-81-devices
Microsoft Windows

Windows Defender ATP will support Windows 7 and 8.1 devices

The move was delayed by more than six months and comes less than a year before Windows 7 support expires
26 Feb 2019
Advertisement
Visit/network-internet/33081/flaws-in-4g-and-5g-could-allow-attackers-to-launch-dos-attacks-and-track
Businessman making a phone call via a 5G network
Network & Internet

Flaws in 5G could allow attackers to launch DoS attacks

Researchers present their findings just as manufacturers gear up to launch wave of 5G-ready handsets
25 Feb 2019
Visit/security/32977/kaspersky-internet-security-2019-review-unbeatable-value
Security

Kaspersky Internet Security 2019 review: Unbeatable value

Old reliable does it again, with supreme effectiveness, extensive features and minimal performance impact
12 Feb 2019
Visit/endpoint-security/30038/three-key-pillars-of-threat-visibility
endpoint security

Three key pillars of threat visibility

For a company to see what threats they’re up against, they need visibility into all the data available
28 Jan 2019
Visit/botnets/32427/mirai-botmasters-now-exploiting-hadoop-flaw-to-target-linux-servers
Botnet
botnets

Mirai now exploiting Hadoop flaw to target Linux servers

Malware used to take half the internet offline is being used to build powerful botnets with just a handful of compromised servers
23 Nov 2018
Visit/encryption/32302/critical-vulnerabilities-ssd-encryption
SSD
encryption

Researchers find 'critical flaws' in SSD encryption

Hardware-based encryption far less secure than presumed with attackers able to access data without passwords
6 Nov 2018
Visit/security/32045/the-a-z-of-security-threats-2018
Security

The A-Z of security threats 2018

Industry experts give their thoughts on the growing range of threats facing modern businesses
3 Oct 2018
Advertisement
Visit/privacy/31769/facebook-pulls-onavo-app-after-violating-apples-privacy-rules
A screenshot of the Onavo Protect app listed on an app store
privacy

Facebook pulls Onavo app after violating Apple's data rules

Apple asked Facebook to "voluntarily" delist the app as it collects data on other smartphone software
23 Aug 2018
Visit/endpoint-security/31664/mobile-point-of-sale-exploit-exposes-customers-to-card-fraud
endpoint security

Mobile point-of-sale exploit exposes customers to card fraud

Devices from PayPal, Square, iZettle and SumUp all found to contain critical security flaws
10 Aug 2018
Advertisement