Security

Is this the end of the road for ransomware?
An abstract image showing a man trying to connect to a computer encrypted by ransomware
ransomware

Is this the end of the road for ransomware?

Hackers seem to have developed a conscience, but it’s unlikely they are gone for good
31 Jul 2021
How to use machine learning and AI in cyber security
A robotic hand holding a lock
Security

How to use machine learning and AI in cyber security

New technologies can augment your security team's response and may even be able to actively deceive attackers
30 Jul 2021
Does cyber security’s public image need a makeover?
A cartoon of a hacker wearing a black hoodie, with crosses on its eyes and blue flames surrounding it
ethical hacking

Does cyber security’s public image need a makeover?

A growing number of ethical hackers want the media to change the way it talks about the industry
30 Jul 2021
Microsoft warns of dangerous ‘BazaCall’ call centre ransomware scam
A fraudulent call centre agent in a dark room surrounded by monitors
ransomware

Microsoft warns of dangerous ‘BazaCall’ call centre ransomware scam

Human operators are tricking victims into manually downloading malware onto their systems
30 Jul 2021
IT Pro News in Review: Record profits in tech, hackers turn to new languages for malware, Amazon's Bitcoin plans
A montage of former Amazon CEO Jeff Bezos overlaid on and image of a faceless person wearing a hoodievideo
Business strategy

IT Pro News in Review: Record profits in tech, hackers turn to new languages for malware, Amazon's Bitcoin plans

Catch up on the most important news of the week in just two minutes
30 Jul 2021
Chipotle’s marketing email hacked to send phishing emails
Chipotle sign on the side of a brick building
phishing

Chipotle’s marketing email hacked to send phishing emails

Over 120 emails attempted to steal login credentials from victims
29 Jul 2021
The top 12 password-cracking techniques used by hackers
A list of poorly-constructed passwords on a notepad
Security

The top 12 password-cracking techniques used by hackers

Some of the most common, and most effective, methods for stealing passwords
29 Jul 2021
Colonial Pipeline hack spurred copycat attacks on other oil and gas companies
Long pipeline heading toward a mountain range
hacking

Colonial Pipeline hack spurred copycat attacks on other oil and gas companies

New research reveals 29% increase in attacks on IT systems and perimeter defenses
29 Jul 2021
Top 30 most exploited vulnerabilities since 2020 revealed
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
exploits

Top 30 most exploited vulnerabilities since 2020 revealed

UK, US, and Australian security agencies reveal the systems businesses need to patch now to prevent continued exploitation
29 Jul 2021
Study finds companies are mishandling cyber security recruitment
An employee on the phone while his computer screen shows "cyber attack" warning
cyber security

Study finds companies are mishandling cyber security recruitment

Recruiters wrong-footed as skills shortage mounts
28 Jul 2021
Dark web ads offering access to corporate networks increase sevenfold
Image of a cyber criminal using several computers in a dark room
hacking

Dark web ads offering access to corporate networks increase sevenfold

New report shines a light on hackers offering “access for sale” to other cyber criminals
28 Jul 2021
Number of hacking tools increasing as cyber criminals become more organized
A hacker wearing black gloves using a laptop keyboard
hacking

Number of hacking tools increasing as cyber criminals become more organized

HP report finds that latest tools can overcome CAPTCHA challenges
28 Jul 2021
What is the Computer Misuse Act?
Keyboard with red-glowing keys
Policy & legislation

What is the Computer Misuse Act?

If your computer systems are attacked, is the law effective enough to put those criminals behind bars?
28 Jul 2021
Google launches new bug bounty platform
Close up Google logo with the security lock icon isolated on black background
ethical hacking

Google launches new bug bounty platform

Vulnerability hunters will be able to improve their skills through the newly launched Bug Hunter University
28 Jul 2021
Zyxel USG Flex 200 review: A timely and effective solution
A photograph of the Zyxel USG Flex 200
Security

Zyxel USG Flex 200 review: A timely and effective solution

A great-value security appliance with top cloud management and clever remote protection features
28 Jul 2021
IoT privacy and security concerns
A secure network depicted by connected padlocks
Security

IoT privacy and security concerns

We take a look at what's needed to really secure internet-connected devices
28 Jul 2021
Data breach costs surge to record high in 2021
The world lit up with red nodes
data breaches

Data breach costs surge to record high in 2021

The cost in the UK was above the global average, but the US is home to the most expensive data breaches
28 Jul 2021
Biden warns cyber attacks could lead to “shooting war”
Cyber warfare depicted by code on two monitors with a soldier in background
cyber attacks

Biden warns cyber attacks could lead to “shooting war”

The comments come as the US continues to battle a wave of serious cyber attacks
28 Jul 2021
Most employees put their workplace at risk by taking cyber security shortcuts
Hand hovering over laptop with padlock graphic superimposed
cyber security

Most employees put their workplace at risk by taking cyber security shortcuts

New survey finds much evidence of password reuse and personal devices on the network
27 Jul 2021
Hackers turning to 'exotic' languages for next-gen malware, report warns
A person on a laptop to depict hacking
malware

Hackers turning to 'exotic' languages for next-gen malware, report warns

Coding languages such as Go, Rust, Nim and DLang are allowing malware authors to avoid signature detection and add layers of obfuscation
27 Jul 2021
Why do you need endpoint security?
Why do you need endpoint security title cardvideo
Security

Why do you need endpoint security?

Protecting your endpoints is now key to defending your business against cyber threats
27 Jul 2021
What is Zero Trust?
What is Zero Trust video title cardvideo
Security

What is Zero Trust?

How can Zero Trust help overcome modern business threats?
27 Jul 2021
TikTok to open cyber security 'Fusion Centre' in Dublin
A finger about to press the TikTok logo in the dark
Security

TikTok to open cyber security 'Fusion Centre' in Dublin

The social media firm set to expand its presence in Ireland and tap into the country's "strong talent pool"
27 Jul 2021