Security

Visit/security/privacy/354293/apple-admits-iphone-11-overrides-settings-to-track-users-locations
privacy

Apple admits iPhone 11 ‘overrides settings’ to track users’ locations

A tracking feature is still enabled after users switch off all location tracking for apps and system services
6 Dec 2019
Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using
identity and access management (IAM)

44 million Microsoft customers found using compromised passwords

The company has issued widespread password resets for those affected
6 Dec 2019
Visit/mobile/5g/354286/why-5g-could-be-a-cyber-security-nightmare
5G

Why 5G could be a cyber security nightmare

The latest generation of mobile connectivity promises many marvellous things, but it could also be a hacker's dream
6 Dec 2019
Visit/security/bugs/354287/hackerone-bug-bounty-platform-breached-by-its-own-user
bugs

HackerOne bug bounty platform breached by its own user

The bug bounty specialist paid the hacker responsible a cool $20,000 for their efforts
6 Dec 2019
Advertisement
Visit/security/cyber-security/354284/labour-mp-targeted-by-russian-phishing-campaign
cyber security

Labour MP ‘targeted by Russian phishing campaign’

Putin critic claims he received malware-loaded documents that claimed to reveal disinformation efforts
5 Dec 2019
Visit/security/cyber-crime/354253/europol-seizes-more-than-30000-counterfeit-sites-on-cyber-monday
Europol HQ
cyber crime

Europol seizes more than 30,000 counterfeit sites on Cyber Monday

The joint operation resulted in three arrests based on 26,000 luxury goods taken from the cyber criminals
3 Dec 2019
Visit/security/cyber-security/354246/millions-of-text-messages-leaked-through-exposed-truedialog-server
cyber security

Millions of text messages leaked through exposed TrueDialog server

Database of 604GB included unencrypted passwords and the contents of SMS messages
2 Dec 2019
Visit/security/trojans/354242/national-crime-agency-brings-down-prolific-trojan-marketplace
Trojan
trojans

National Crime Agency brings down prolific Trojan marketplace

Imminent Methods sold IM-RAT malware for as little as $25
2 Dec 2019
Visit/security/privacy/354241/stop-leaking-your-identity
data leak warning
privacy

Stop leaking your identity

Are you inadvertently sharing sensitive information online? We reveal how to identify data leaks and plug the holes in your privacy
2 Dec 2019
Advertisement
Visit/disaster-recovery-dr/33803/tips-to-improve-your-disaster-recovery-strategy
Data centre with green high speed visualisation projection overlay
disaster recovery (DR)

Nine tips to improve your disaster recovery strategy

Whether you have a well-rehearsed DR plan in place or are just starting out, here's how to take your strategy to the next level
29 Nov 2019
Visit/security/hacking/354233/dead-netflix-accounts-reactivated-by-hackers
hacking

Dead Netflix accounts reactivated by hackers

Former users are being charged months after cancelling subscriptions, according to reports
29 Nov 2019
Advertisement
Visit/security/cyber-security/354224/security-flaws-prevalent-in-applications-produced-by-software
cyber security

Security flaws prevalent in applications produced by software vendors

Secure development is the key to a secure application
29 Nov 2019
Visit/security/cyber-security/354226/how-to-build-an-effective-cyber-resilience-strategy
Whitepaperwhitepaper

How to build an effective cyber resilience strategy

Don’t let your organisation be caught unprepared
29 Nov 2019
Visit/business-strategy/startups/354216/gitguardian-the-security-startup-hunting-down-online-secrets-to
startups

GitGuardian, the security startup hunting down online secrets to keep companies safe from hackers

More than 3,000 company credentials unwittingly end up online everyday. GitGuardian helps firms plug these leaks
29 Nov 2019
Visit/security/data-breaches/354219/adobe-discloses-magento-marketplace-data-breach
data breaches

Adobe discloses Magento Marketplace data breach

The e-commerce platform was taken offline after a hacker accessed customer data and commercial information
28 Nov 2019
Advertisement
Visit/business/policy-legislation/354218/german-double-murderer-wins-right-to-be-forgotten-case
Policy & legislation

German double murderer wins 'right to be forgotten' case

The latest in a long line of high-profile cases to result in a win for the complainant
28 Nov 2019
Visit/security/enterprise-security/354215/what-is-devsecops-and-why-is-it-important
enterprise security

What is DevSecOps and why is it important?

This new flavour of DevOps is helping organisations rapidly implement security by design
27 Nov 2019
Visit/security/spyware/354214/nso-group-workers-sue-facebook-for-blocking-private-accounts
spyware

NSO Group workers sue Facebook for blocking private accounts

The action comes after WhatsApp sued the firm for its alleged role in the Pegasus video hack
27 Nov 2019
Visit/security/cyber-security/354211/cyber-security-skills-shortage-near-breaking-point
cyber security

Cyber security skills shortage near breaking point

A lack of government interest and Brexit is widening the skills gap, say UK IT decision-makers
27 Nov 2019
Visit/security/internet-security/354194/sir-tim-berners-lee-champions-new-rules-designed-to-fix-the
internet security

Sir Tim Berners-Lee champions new rules designed to 'fix the internet'

The internet luminary wants the tech industry and governments to hold each other to account
25 Nov 2019
Visit/security/data-breaches/354192/t-mobile-data-breach-affects-more-than-a-million-users
data breaches

T-Mobile data breach affects more than a million users

The company has given no indication as to whether any personal information has been stolen
25 Nov 2019
Advertisement
Visit/security/bugs/354180/google-to-offer-15m-to-anyone-that-can-break-a-pixel-4
bugs

Google to offer $1.5m to anyone that can break a Pixel 4

In a bid to make its Titan technology more secure, Google takes a page out of Apple's playbook
22 Nov 2019
Visit/security/cyber-security/354174/biometric-data-leaks-and-targeted-ransomware-to-dominate-2020-threat
cyber security

Biometric data leaks and targeted ransomware to dominate 2020 threat landscape

Expect attackers to go after devices previously overlooked
21 Nov 2019