internet security
What is ethical hacking? White hat hackers explained

What is ethical hacking? White hat hackers explained
Not all hackers are motivated by greed - some of them use their powers for good
9 Apr 2021
What is cross-site scripting (XSS)?

What is cross-site scripting (XSS)?
How XSS exploits work and how to defend against them
7 Apr 2021
How to enable private browsing on any device

How to enable private browsing on any device
Want to know how to surf the web privately on Windows, Mac, iOS or Android devices? Here's our private browsing guide
8 Mar 2021
How to ditch LastPass for a new password manager

How to ditch LastPass for a new password manager
If you don’t feel like paying for cross-platform access to your passwords, switching services is easily done
17 Feb 2021
What is WannaCry? 

What is WannaCry?
The full story behind one of the worst ransomware outbreaks in history
4 Feb 2021
Your essential guide to internet security

Your essential guide to internet security
We explain how to ensure both you and your business remain safe online
27 Jan 2021
What is the dark web?

What is the dark web?
We shine a light on the often unsavoury corners of the World Wide Web
5 Jan 2021
Trump signs order against TikTok and WeChat

Trump signs order against TikTok and WeChat
ByteDance says it's considering all options in response to ban, which begins in 45 days
7 Aug 2020
Trump confirms US cyber attack on Russia election trolls

Trump confirms US cyber attack on Russia election trolls
US president confirms his administration launched a successful campaign against the Internet Research Agency
13 Jul 2020
UK gov to offer £400k for IoT security schemes

UK gov to offer £400k for IoT security schemes
The aim is to create a range of testing programmes for manufacturers to choose from
29 May 2020
Zoom CEO admits company "moved too fast" as privacy issues mount

Zoom CEO admits company "moved too fast" as privacy issues mount
Eric Yuan insists platform will put "privacy and security first"
6 Apr 2020
Mozilla fixes two Firefox zero-days being actively exploited

Mozilla fixes two Firefox zero-days being actively exploited
Critical vulnerabilities allow attackers to execute arbitrary code or trigger crashes
6 Apr 2020
Exploited Internet Explorer flaw won't be patched until next month

Exploited Internet Explorer flaw won't be patched until next month
Microsoft's legacy browser hit by zero-day strikingly similar to one found in Mozilla's Firefox
20 Jan 2020
Facebook exec calls Cambridge Analytica scandal a "non event"

Facebook exec calls Cambridge Analytica scandal a "non event"
Andrew Bosworth has popped up with another controversial internal memo, this time looking back at media criticism in 2019
8 Jan 2020
Avast and AVG extensions pulled from Chrome 

Avast and AVG extensions pulled from Chrome
Avast and AVG once again criticised for excessive data collection in security and shopping browser extensions
19 Dec 2019
Sir Tim Berners-Lee champions new rules designed to 'fix the internet'

Sir Tim Berners-Lee champions new rules designed to 'fix the internet'
The internet luminary wants the tech industry and governments to hold each other to account
25 Nov 2019
Thousands infected with malware that 'reinstalls itself'

Thousands infected with malware that 'reinstalls itself'
More than 45,000 Android devices have been affected by the Xhelper malware since March
30 Oct 2019
Humans 'unfit' to handle access managment, say Goldman Sachs

Humans 'unfit' to handle access managment, say Goldman Sachs
Privileged access management is rarely done well and humans are usually the issue
29 Oct 2019
IoT botnets are on the rise and 5G isn’t helping anything

IoT botnets are on the rise and 5G isn’t helping anything
Botnets are more common and coming in more diverse strains than ever before
29 Oct 2019
NordVPN confirms 2018 data centre breach

NordVPN confirms 2018 data centre breach
Personal virtual private network provider admits to a breach in March 2018 but claims no data was exfiltrated
22 Oct 2019
Five steps to an effective layered defence strategy

Five steps to an effective layered defence strategy
Analysing weak spots in an IT system can be challenging, which is why a layered approach is important
2 Oct 2019
Thousands of webcams vulnerable to attack

Thousands of webcams vulnerable to attack
Exposed connections could lead to loss of privacy or information theft
25 Sep 2019
Modern cyber security bears 'great resemblance to Titanic'

Modern cyber security bears 'great resemblance to Titanic'
The security head likens the maritime disaster to cyber security blunders and gives his thoughts on how to move forward
19 Sep 2019