What is a Trojan?
Toy horse on a digital screen to symbolise the attack of the Trojan virus
Security

What is a Trojan?

The malicious malware lurks behind legitimate software to invade your computer
18 Nov 2020
Best ransomware removal tools
A ransomware splash screen displayed on a laptop in an office
Security

Best ransomware removal tools

The top free and paid toolkits available right now to protect you from hackers
17 Nov 2020
Best free malware removal tools 2020
Malware spotted in red code on black background
Security

Best free malware removal tools 2020

Worried your device is infected? Here are the tools you need to get rid of malicious software
17 Nov 2020
The top 12 password-cracking techniques used by hackers
A list of poorly-constructed passwords on a notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective, methods for stealing passwords
17 Nov 2020
Intel CPUs vulnerable to 'Platypus' side-channel attacks
The Intel i7 10th Gen processor logo sticker on the Lenovo ThinkPad X390 against a white background
Security

Intel CPUs vulnerable to 'Platypus' side-channel attacks

Researchers discover exploits that use fluctuations in software power consumption to access sensitive data
10 Nov 2020
Should we be worried about self-learning malware?
A 2d picture of a brain one a background of binary in red and black
cyber security

Should we be worried about self-learning malware?

Some analysts predict self-learning malware will cause a major security breach by 2024, but not everyone agrees
7 Nov 2020
Mattel admits it was hit by a ransomware attack
The facade of Mattel's corporate headquarters building in El Segundo, California, with a clear blue sky in the background
ransomware

Mattel admits it was hit by a ransomware attack

The leading toy manufacturer is thought to have fallen victim to Trickbot malware
4 Nov 2020
Maze ransomware gang retires from cyber crime
The word ransomware shown in binary code
Security

Maze ransomware gang retires from cyber crime

The statement released by the group suggests cryptocurrency market shifts might be pricing the group out of operations
2 Nov 2020
BBC hit with over 250,000 phishing emails every day
Person checking email inbox while sitting at a desk
phishing

BBC hit with over 250,000 phishing emails every day

An FOI request has revealed that the broadcaster is blocking almost seven million malicious emails a month
2 Nov 2020
Ryuk behind a third of all ransomware attacks in 2020
Security

Ryuk behind a third of all ransomware attacks in 2020

Attacks surged from just 5,000 during the first three quarters of 2019 to 67 million in 2020 so far
29 Oct 2020
Sopra Steria confirms it was hit by new Ryuk ransomware variant
Computer virus transfer into a desktop PC by internet LAN line
Security

Sopra Steria confirms it was hit by new Ryuk ransomware variant

The French IT services firm has admitted it will take "weeks" for business operations to return to normal
26 Oct 2020
Microsoft spearheads industry-wide charter against AI cyber attacks
Security

Microsoft spearheads industry-wide charter against AI cyber attacks

Security professionals can rely on the framework to fight cyber attacks targeting corporate machine learning systems
23 Oct 2020
Weekly threat roundup: Chrome, Citrix and WordPress
Graphic of a red unlocked padlock surrounded by smaller blue locked padlocks
Security

Weekly threat roundup: Chrome, Citrix and WordPress

Pulling together the most dangerous and pressing flaws that businesses need to patch
23 Oct 2020
US charges six Russians behind NotPetya and Olympics hacks
Abstract silhouette of a computer hacker in front of a Russian flag
Security

US charges six Russians behind NotPetya and Olympics hacks

The GRU members spread some of the most infamous malware strains including NotPetya and Olympic Destroyer
20 Oct 2020
Microsoft becomes the most-spoofed brand for phishing attacks
Security

Microsoft becomes the most-spoofed brand for phishing attacks

The tech giant was imitated in almost 20% of all phishing attacks during the third quarter
20 Oct 2020
Bank-targeting malware disguises itself as video conferencing software
Security

Bank-targeting malware disguises itself as video conferencing software

IBM says the Vizom malware is spreading through spam-based phishing campaigns
19 Oct 2020
Weekly threat roundup: Windows 10, Adobe, and SonicWall VPNs
Graphic of a red unlocked padlock surrounded by smaller blue locked padlocks
Security

Weekly threat roundup: Windows 10, Adobe, and SonicWall VPNs

The most dangerous and pressing cyber security exploits from the week gone by
16 Oct 2020
What is hacktivism?
hacking

What is hacktivism?

From Anonymous to Omega, here’s everything you need to know about hackers with a conscience
13 Oct 2020
Microsoft disrupts infamous Trickbot botnet ahead of US election
ransomware

Microsoft disrupts infamous Trickbot botnet ahead of US election

Trickbot primarily targets financial institutions, but it could impact the election too
12 Oct 2020
What is WannaCry?
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
12 Oct 2020
Weekly threat roundup: Apple, AMD, and Google
Graphic of a red unlocked padlock surrounded by smaller blue locked padlocks
Security

Weekly threat roundup: Apple, AMD, and Google

The most dangerous and pressing cyber security exploits from the week gone by
9 Oct 2020
The top 12 password-cracking techniques used by hackers
A list of poorly-constructed passwords on a notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective, methods for stealing passwords
5 Oct 2020
IoT botnet exploiting two zero-day flaws in Tenda routers
Botnet graphic
Security

IoT botnet exploiting two zero-day flaws in Tenda routers

The Ttint botnet is based heavily on the Mirai malware and includes 12 protocols for remote access
5 Oct 2020