Intel CPUs vulnerable to 'Platypus' side-channel attacks
The Intel i7 10th Gen processor logo sticker on the Lenovo ThinkPad X390 against a white background
Security

Intel CPUs vulnerable to 'Platypus' side-channel attacks

Researchers discover exploits that use fluctuations in software power consumption to access sensitive data
10 Nov 2020
Should we be worried about self-learning malware?
A 2d picture of a brain one a background of binary in red and black
cyber security

Should we be worried about self-learning malware?

Some analysts predict self-learning malware will cause a major security breach by 2024, but not everyone agrees
7 Nov 2020
Mattel admits it was hit by a ransomware attack
The facade of Mattel's corporate headquarters building in El Segundo, California, with a clear blue sky in the background
ransomware

Mattel admits it was hit by a ransomware attack

The leading toy manufacturer is thought to have fallen victim to Trickbot malware
4 Nov 2020
Maze ransomware gang retires from cyber crime
Visual representation of ransomware by showing encrypted files on a display
ransomware

Maze ransomware gang retires from cyber crime

The statement released by the group suggests cryptocurrency market shifts might be pricing the group out of operations
2 Nov 2020
BBC hit with over 250,000 phishing emails every day
Person checking email inbox while sitting at a desk
phishing

BBC hit with over 250,000 phishing emails every day

An FOI request has revealed that the broadcaster is blocking almost seven million malicious emails a month
2 Nov 2020
Ryuk behind a third of all ransomware attacks in 2020
Desktop monitor and mobile phone with hand pointing
ransomware

Ryuk behind a third of all ransomware attacks in 2020

Attacks surged from just 5,000 during the first three quarters of 2019 to 67 million in 2020 so far
29 Oct 2020
Microsoft spearheads industry-wide charter against AI cyber attacks
Security

Microsoft spearheads industry-wide charter against AI cyber attacks

Security professionals can rely on the framework to fight cyber attacks targeting corporate machine learning systems
23 Oct 2020
Weekly threat roundup: Chrome, Citrix and WordPress
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
Security

Weekly threat roundup: Chrome, Citrix and WordPress

Pulling together the most dangerous and pressing flaws that businesses need to patch
23 Oct 2020
US charges six Russians behind NotPetya and Olympics hacks
Abstract silhouette of a computer hacker in front of a Russian flag
Security

US charges six Russians behind NotPetya and Olympics hacks

The GRU members spread some of the most infamous malware strains including NotPetya and Olympic Destroyer
20 Oct 2020
Microsoft becomes the most-spoofed brand for phishing attacks
Security

Microsoft becomes the most-spoofed brand for phishing attacks

The tech giant was imitated in almost 20% of all phishing attacks during the third quarter
20 Oct 2020
Bank-targeting malware disguises itself as video conferencing software
Security

Bank-targeting malware disguises itself as video conferencing software

IBM says the Vizom malware is spreading through spam-based phishing campaigns
19 Oct 2020
Weekly threat roundup: Windows 10, Adobe, and SonicWall VPNs
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
Security

Weekly threat roundup: Windows 10, Adobe, and SonicWall VPNs

The most dangerous and pressing cyber security exploits from the week gone by
16 Oct 2020
Microsoft disrupts infamous Trickbot botnet ahead of US election
ransomware

Microsoft disrupts infamous Trickbot botnet ahead of US election

Trickbot primarily targets financial institutions, but it could impact the election too
12 Oct 2020
What is WannaCry?
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
12 Oct 2020
Weekly threat roundup: Apple, AMD, and Google
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
Security

Weekly threat roundup: Apple, AMD, and Google

The most dangerous and pressing cyber security exploits from the week gone by
9 Oct 2020
The top 12 password-cracking techniques used by hackers
A list of poorly-constructed passwords on a notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective, methods for stealing passwords
5 Oct 2020
IoT botnet exploiting two zero-day flaws in Tenda routers
Botnet graphic
Security

IoT botnet exploiting two zero-day flaws in Tenda routers

The Ttint botnet is based heavily on the Mirai malware and includes 12 protocols for remote access
5 Oct 2020
How computer viruses spread and how to avoid them
malware

How computer viruses spread and how to avoid them

You know that computer viruses can be a nightmare; here's how they spread from one computer to the next
1 Oct 2020
US hospitals forced offline by reported Ryuk ransomware attack
A forlorn doctor in a facemask, looking out the window
ransomware

US hospitals forced offline by reported Ryuk ransomware attack

Universal Health Services employees have been told IT issues could go on for days
29 Sep 2020
Google removes 17 apps infected with evasive ‘Joker’ malware
The Google Play Store application as shown on a smartphone display
malware

Google removes 17 apps infected with evasive ‘Joker’ malware

Researchers identify three variations in the way the 'fleeceware' strain infects victims' Android devices
28 Sep 2020
How to install Kali Linux on Raspberry Pi
Security

How to install Kali Linux on Raspberry Pi

Follow these simple steps to install the penetration testing software on the compact computer for mobile hacking
22 Sep 2020
Ransomwiz lets you test your security with simulated ransomware
Ransomwiz logo on black background
ransomware

Ransomwiz lets you test your security with simulated ransomware

Nyotron says it’s easy enough for even the most junior security employee to operate
21 Sep 2020
Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web
trojans

Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web

The source code for the authenticator-breaking malware is available for free on underground forums
18 Sep 2020
Mozilla finally shuts down Firefox Send
Graphic representing the Firefox Send service
malware

Mozilla finally shuts down Firefox Send

Service abandoned after it was exploited by hackers to spread malware
18 Sep 2020