Security

Android apps still vulnerable to a major bug despite an existing patch
Thumb touching a phone's screen within the Android App store
Google Android

Android apps still vulnerable to a major bug despite an existing patch

Millions of users at risk from a flaw in the Google Play core library
3 Dec 2020
20 Universities targeted by “Shadow Academy” hackers
man reading computer code
hacking

20 Universities targeted by “Shadow Academy” hackers

Hackers identified after the discovery of a fake Louisiana State University student portal
3 Dec 2020
IBM: Hackers are targeting COVID-19 vaccine 'cold chain'
A gloved medical employee conducting research on COVID-19
Security

IBM: Hackers are targeting COVID-19 vaccine 'cold chain'

A phishing campaign targeted organisations that held sensitive information relating to COVID-19 vaccine distribution
3 Dec 2020
New Trickbot variant can interfere with UEFI and BIOS
Malware spotted in red code on black background
malware

New Trickbot variant can interfere with UEFI and BIOS

Researchers warn that threat actors could already be exploiting these flaws against high-value targets
3 Dec 2020
GitHub: Open source vulnerabilities can go undetected for four years
GitHub office with GitHub logo over top
Security

GitHub: Open source vulnerabilities can go undetected for four years

GitHub research finds that time between vulnerability detection and fix must shorten
3 Dec 2020
Why consumer IoT security is now a business problem
A businesswoman working from home and smiling at a smart speaker
Internet of Things (IoT)

Why consumer IoT security is now a business problem

Innocent-looking smart devices could be putting your corporate network at risk
3 Dec 2020
What is shoulder surfing?
Someone looking over a woman's shoulder at a phone screen
Security

What is shoulder surfing?

This social engineering technique can pose a major security risk, so here's how to best protect against it
2 Dec 2020
Security benefits of open virtualised RAN
security benefits of open virtualised RAN - radio access network - whitepaper
Whitepaperwhitepaper

Security benefits of open virtualised RAN

How radio access network infrastructure strengthens and simplifies your security strategy
2 Dec 2020
Bitdefender debuts cloud-based endpoint detection and response solution
Endpoints on a background of a city
endpoint security

Bitdefender debuts cloud-based endpoint detection and response solution

New solution enables quick visibility into vulnerabilities, both on-premises and in the cloud
2 Dec 2020
Google's Project Zero uncovers iPhone zero-day Wi-Fi exploit
Coffee drinker using a black iPhone 11
remote access

Google's Project Zero uncovers iPhone zero-day Wi-Fi exploit

Buggy code in iOS could have been exploited by hackers to remotely take control of devices
2 Dec 2020
How do hackers choose their targets?
An illustration of four cyber criminals stealing money from an online account
hacking

How do hackers choose their targets?

We explore what goes on in the minds of cyber criminals
2 Dec 2020
Microsoft anonymises Productivity Score feature after privacy backlash
Computer user touching on the Microsoft Word icon to open the programme
Microsoft Office

Microsoft anonymises Productivity Score feature after privacy backlash

Privacy experts had slammed the feature as a "snooper’s charter" for bosses to spy on workers
2 Dec 2020
Data: A resource much too valuable to leave unprotected
Why you need to protect your data resources - whitepaper
Whitepaperwhitepaper

Data: A resource much too valuable to leave unprotected

Protect your data to protect your company
2 Dec 2020
What is a 502 bad gateway and how do you fix it?
502 Bad Gateway page that pops up when a website has a connection issue with its server
web hosting

What is a 502 bad gateway and how do you fix it?

We explain what this networking error means for users and website owners
2 Dec 2020
Simplify your security operations centre
How to simplify your security operations - Red Hat whitepaper
automationwhitepaper

Simplify your security operations centre

Gain speed, time, and security with a unified automation platform
2 Dec 2020
5 steps to automate your business
How to automate your business - whitepaper from Red Hat
Whitepaperwhitepaper

5 steps to automate your business

Supporting IT strategies through enterprise-wide automation
2 Dec 2020
Canon employee data exposed in ransomware attack
 Canon sign at the Canon Solutions America offices in Silicon Valley
ransomware

Canon employee data exposed in ransomware attack

The company has admitted that hackers accessed sensitive information about current and former employees
1 Dec 2020
Microsoft Defender for Identity can now detect Zerologon exploits
A security flaw depicted by a padlock with bullet holes on a circuit board
Security

Microsoft Defender for Identity can now detect Zerologon exploits

The update will help SecOps teams find and mitigate attacks using the authentication bypass flaw
1 Dec 2020
How much will a data breach really damage your organisation’s reputation?
Open padlock on circuit board
data breaches

How much will a data breach really damage your organisation’s reputation?

It’s not just fines that can hurt in the wake of a data breach – your reputation can take a hit, too
30 Nov 2020
Hackers could trick scientists into making deadly toxins
A female scientist looking through a microscope in a laboratory
hacking

Hackers could trick scientists into making deadly toxins

A new cyber attack could unleash a synthetic virus pandemic
30 Nov 2020
Top security tips for employees working from home
A man typing on a laptop keyboard with icons for home wifi, security, storage, analytics, settings and more floating around
Security

Top security tips for employees working from home

Working from home doesn’t have to mean working unsafely
30 Nov 2020
What is AES encryption?
Graphic showing a digital padlock overlaid above information that has been encrypted
Advanced Encryption Standard (AES)

What is AES encryption?

AES is one of the most widely used encryption protocols, but where did it come from and how does it work?
30 Nov 2020
UK's Huawei 5G ban brought forward to September 2021
Huawei logo displayed on a shopfront
Security

UK's Huawei 5G ban brought forward to September 2021

The new rules address concerns that equipment could be stockpiled to be installed at a later date
30 Nov 2020