network security

What is public key infrastructure (PKI)?
Graphic representing security in either data protection or cyber security contexts
Security

What is public key infrastructure (PKI)?

This technology can help secure data using a number of components
18 Nov 2020
Microsoft expands Defender capabilities for Linux systems
The logs of a Linux server as shown on a display
Security

Microsoft expands Defender capabilities for Linux systems

Defender for Endpoint customers will be able to detect and remediate advanced threats involving Linux servers
18 Nov 2020
CMS platforms succumb to KashmirBlack botnet as businesses rush online
Visual representation of an active botnet, with several black nodes connected with white strands
Security

CMS platforms succumb to KashmirBlack botnet as businesses rush online

Businesses warned to prioritise security as coronavirus forces many to ply their trade digitally
22 Oct 2020
Mobile browser flaw exposes users to spoofing attacks
An anonymous mobile phone user using their device in a darkened room
Security

Mobile browser flaw exposes users to spoofing attacks

Safari and Opera Touch browsers are among those which can be exploited to target victims with malware
21 Oct 2020
Managing employee security risks during lockdown
Security

Managing employee security risks during lockdown

COVID-19 doesn’t have to compromise your organisation’s security
20 Oct 2020
Weekly threat roundup: Nvidia, BitLocker, and HackerOne
Graphic of a red unlocked padlock surrounded by smaller blue locked padlocks
Security

Weekly threat roundup: Nvidia, BitLocker, and HackerOne

The most dangerous and pressing flaws from the week gone by
2 Oct 2020
BT and Toshiba reveal UK’s first "unhackable" quantum-secure network
Network & Internet

BT and Toshiba reveal UK’s first "unhackable" quantum-secure network

The network aims to show how the Quantum Key Distribution can be used to secure data traffic between industrial sites
1 Oct 2020
Secure your Wi-Fi against hackers in 10 steps
network security

Secure your Wi-Fi against hackers in 10 steps

Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
29 Sep 2020
Flightradar24 struck by three cyber attacks in two days
A photograph of the Flightradar24 website home page
cyber attacks

Flightradar24 struck by three cyber attacks in two days

The continued onslaught has knocked the flight tracker offline as its engineers work to restore services
29 Sep 2020
What is shadow IT?
Man holding mobile phone over laptop with double exposure city overlay
Security

What is shadow IT?

Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
29 Sep 2020
Zyxel ZyWall ATP100 review: Cost-effective, but not cloudy
unified threat management (UTM)

Zyxel ZyWall ATP100 review: Cost-effective, but not cloudy

This security solution brings a good set of protection features to small businesses on a budget
29 Sep 2020
How to install Kali Linux on Raspberry Pi
Security

How to install Kali Linux on Raspberry Pi

Follow these simple steps to install the penetration testing software on the compact computer for mobile hacking
22 Sep 2020
Firefox flaw let hackers hijack Android browser over Wi-Fi
The installation Firefox page for the app on an Android device
vulnerability

Firefox flaw let hackers hijack Android browser over Wi-Fi

Mozilla has rushed out a fix for the bug that bears resemblance to an RCE flaw
22 Sep 2020
Windows Server flaw sparks emergency US gov warning
vulnerability

Windows Server flaw sparks emergency US gov warning

All government agencies had four days to patch their systems against a CVSS 10-rated elevation of privilege flaw
21 Sep 2020
Big data is 'giving us an edge over hackers' for the first time, says Microsoft CISO
A concept image of a hacker behind a stream of binary
Security

Big data is 'giving us an edge over hackers' for the first time, says Microsoft CISO

Massive amounts of network, endpoint, application and identity signals are being used to train machine learning models and improve detection
17 Sep 2020
Bluetooth advocacy group warns of critical encryption exploit
vulnerability

Bluetooth advocacy group warns of critical encryption exploit

The vulnerability allows third-parties to overwrite the key used to establish a link between two devices
11 Sep 2020
Threat intelligence leads to intelligent defense
Sponsoredwhitepaper

Threat intelligence leads to intelligent defense

The modern workplace makes the traditional network perimeter irrelevant, and businesses must adapt to secure themselves
21 Aug 2020
Government agencies face security challenges in wake of COVID-19
Whitepaperwhitepaper

Government agencies face security challenges in wake of COVID-19

Beat the crisis by learning how to secure your network
6 May 2020
IT faces new security challenges in the wake of COVID-19
Whitepaperwhitepaper

IT faces new security challenges in the wake of COVID-19

Beat the crisis by learning how to secure your network
6 May 2020
2020 report: The threat posed by shadow IoT devices
Whitepaperwhitepaper

2020 report: The threat posed by shadow IoT devices

Unsanctioned IoT devices open a portal for chaos across the network
17 Apr 2020
Billion-plus Wi-Fi devices hit by serious Kr00k vulnerability
vulnerability

Billion-plus Wi-Fi devices hit by serious Kr00k vulnerability

The flaw chiefly affects Broadcom and Cypress Wi-Fi chips and is related to the infamous KRACK attacks
27 Feb 2020
Cisco fixes critical flaw in network management platform
network security

Cisco fixes critical flaw in network management platform

The latest security hole is patched just days before the firm’s flagship Cisco Live 2020 conference
24 Jan 2020
Why 5G could be a cyber security nightmare
5G

Why 5G could be a cyber security nightmare

The latest generation of mobile connectivity promises many marvellous things, but it could also be a hacker's dream
6 Dec 2019