Security
Show me:
- botnets
- biometrics
- antivirus
- Advanced Encryption Standard (AES)
- ethical hacking
- firewalls
- hacking
- unified threat management (UTM)
- network security
- National Cyber Security Centre (NCSC)
- malware
- laptop security
- cross-site scripting (XSS)
- internet security
- bugs
- information security (InfoSec)
- cyber attacks
- identity theft
- encryption
- identity and access management (IAM)
- cyber security
- zero-day exploit
- WannaCry
- vulnerability
- two-factor authentication (2FA)
- exploits
- trojans
- touch ID
- enterprise security
- The Shadow Brokers (TSB)
- endpoint security
- SSL & SSL certificates
- spyware
- e safety
- social engineering
- cyber warfare
- single sign-on (SSO)
- distributed denial of service (DDOS)
- security, information and event management (SIEM)
- scams
- cyber terrorism
- ransomware
- cyber crime
- Privacy Shield
- data breaches
- privacy
- data encryption standards (DES)
- phishing
- denial of service (DOS)
- penetration testing
PowerShell threats increased over 200% last year

PowerShell threats increased over 200% last year
A new McAfee report finds PowerShell attacks driven largely by Donoff malware.
14 Apr 2021
Microsoft patches actively exploited Desktop Window Manager flaw

Microsoft patches actively exploited Desktop Window Manager flaw
The latest Patch Tuesday round of updates include fixes for 114 vulnerabilities, including five zero-days
14 Apr 2021
NSA uncovers new "critical" flaws in Microsoft Exchange Server

NSA uncovers new "critical" flaws in Microsoft Exchange Server
Federal government orders all agencies to install fixes as the FBI scrambles to remove backdoors
14 Apr 2021
Russia launched over a million cyber attacks in three months

Russia launched over a million cyber attacks in three months
Unit 42 researchers found 75% of the attacks were critical
13 Apr 2021
New DNS vulnerabilities put millions of IoT devices at risk

New DNS vulnerabilities put millions of IoT devices at risk
The NAME:WRECK flaws affects four popular TCP/IP stacks
13 Apr 2021
Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?

Cloud storage: How secure are Dropbox, OneDrive, Google Drive, and iCloud?
Each of these popular cloud platforms boasts robust security - but which does it best?
13 Apr 2021
5G will accelerate cyber crime, predicts former White House CIO

5G will accelerate cyber crime, predicts former White House CIO
Speaking at Aruba Atmosphere '21, Payton warned the technology will lead to "massive cyber attacks" this year
13 Apr 2021
Microsoft Surface Laptop 4 official with AMD and Intel CPU options

Microsoft Surface Laptop 4 official with AMD and Intel CPU options
The firm claims the machine, which has been designed for hybrid working, is up to 70% faster than the Surface Laptop 3
13 Apr 2021
Gmail "more secure" than parliamentary email, says MP

Gmail "more secure" than parliamentary email, says MP
Conservative MP Tom Tugendhat claims he's been the victim of multiple cyber attacks from foreign nations
13 Apr 2021
ePrivacy Regulation: What is it and how does it affect me?

ePrivacy Regulation: What is it and how does it affect me?
We look at the new rules designed to maintain user privacy in the digital age
13 Apr 2021
BRATA malware disguises itself as security tools on Google Play

BRATA malware disguises itself as security tools on Google Play
Hackers are tricking victims into granting their malicious apps certain permissions before taking control of Android devices
13 Apr 2021
Apple and Google block NHS COVID-19 app update

Apple and Google block NHS COVID-19 app update
The update breached the tech giant's rules about collecting and sharing location data
12 Apr 2021
Royal Mail-related phishing scams surge by 645%

Royal Mail-related phishing scams surge by 645%
Check Point found that the average weekly number of attacks increased from 20 to 150 last month
12 Apr 2021
Hackers leak data from dark web marketplace

Hackers leak data from dark web marketplace
Over 600,000 payment card records and 12,000 user records leaked
9 Apr 2021
What is ethical hacking? White hat hackers explained

What is ethical hacking? White hat hackers explained
Not all hackers are motivated by greed - some of them use their powers for good
9 Apr 2021
How to encrypt files and folders in Windows 10

How to encrypt files and folders in Windows 10
Here’s how to make your sensitive data unreadable to prying eyes
9 Apr 2021
The definitive guide to IT security
The definitive guide to IT security
Protecting your MSP and your customers
9 Apr 2021
Gigaset devices laced with malware after third-party server hack

Gigaset devices laced with malware after third-party server hack
Several Android smartphones have been pre-packaged with malicious apps as part of a supply chain attack
9 Apr 2021
MSP cyber security report warns of tougher regulations ahead

MSP cyber security report warns of tougher regulations ahead
Government or insurance providers will likely take a stand against vulnerable MSPs in 2021
9 Apr 2021
NCSC warns 15% of Brits use their pet's name as a password

NCSC warns 15% of Brits use their pet's name as a password
Independent survey reveals UK public still relies on memorable phrases to protect accounts
9 Apr 2021
Evidence suggests REvil behind Harris Federation ransomware attack

Evidence suggests REvil behind Harris Federation ransomware attack
The trust’s financial records have been discovered on a dark web site known to be operated by the infamous group
9 Apr 2021
Fujitsu taps Trend Micro to secure private 5G networks in smart factories

Fujitsu taps Trend Micro to secure private 5G networks in smart factories
Trend Micro’s 5G security solution identifies vulnerabilities and suspicious network behaviors
8 Apr 2021