IT Pro is supported by its audience. When you purchase through links on our site, we may earn an affiliate commission. Learn more

Security

Schneider Electric to exit Russia
A view of the entrance hall of a Schneider Electric building
Policy & legislation

Schneider Electric to exit Russia

The company is selling its Russian unit to local management, as it joins a host of countries leaving the country
4 Jul 2022
HackerOne employee fired for using position to steal bug bounties
A hand holding a magnifying glass reveals a red lock, unlocked among several blue locked locks
Security

HackerOne employee fired for using position to steal bug bounties

The threat actor was identified by their duplicate data, which they were trying to pass off as their own for financial gain
4 Jul 2022
Latest LockBit ransomware strain 'strikingly similar' to BlackMatter
LockBit 3.0 logo
ransomware

Latest LockBit ransomware strain 'strikingly similar' to BlackMatter

Experts have got their hands on the latest ransomware program from LockBit with "large portions of the code" ripped straight from the scariest strains…
4 Jul 2022
Hackers claim to steal personal data of over a billion people in China
Hacker on a computer with a Chinese flag in the background
data breaches

Hackers claim to steal personal data of over a billion people in China

The attackers have reportedly offered to sell over 23 terabytes of data for 10 bitcoin
4 Jul 2022
Security experts 'concerned' over compromise of British Army's social media accounts
A black British Army sign hanging outside one of its recruitment centres
Security

Security experts 'concerned' over compromise of British Army's social media accounts

For a number of hours on Sunday evening, the British Army's Twitter and YouTube accounts were peddling NFTs
4 Jul 2022
Universities are fighting a cyber security war on multiple fronts
A cybersecurity expert examines an attack
cyber security

Universities are fighting a cyber security war on multiple fronts

Businesses may be under constant threat, but for institutions that harbour sensitive R&D, the stakes are much higher
4 Jul 2022
What is the EU’s Digital Operational Resilience Act (DORA)?
A shadowy figure in front of a digital EU flag
Policy & legislation

What is the EU’s Digital Operational Resilience Act (DORA)?

Although DORA mostly affects the financial sector, these regulations - which aim to boost cyber resilience - will have huge knock-on effects on IT rol…
2 Jul 2022
Google merges Chrome and Android password managers after community feedback
An abstract image of three devices with open padlocks on their screens connected to a series of asterisks representing a password
Security

Google merges Chrome and Android password managers after community feedback

The tech giant is also giving users the ability to generate passwords for iOS apps when Chrome is set as the autofill provider
1 Jul 2022
Actively exploited server backdoor remains undetected in most organisations' networks
Bright blue code appearing on screen to denote hacking
cyber attacks

Actively exploited server backdoor remains undetected in most organisations' networks

Kaspersky researchers identified a growing trend of implanting highly stealthy backdoors in the servers belonging to the most powerful organisations
1 Jul 2022
The public sector will no longer face eye-watering data breach fines, ICO confirms
A close up image of a smartphone with the ICO webpage displayed on screen
public sector

The public sector will no longer face eye-watering data breach fines, ICO confirms

The regulator will, however, increase the use of its wider powers like handing out warnings and reprimands
1 Jul 2022
Northern Ireland is the future of British cyber security
Belfast Lagan Weir Pedestrian and Cycle Bridge Northern Ireland at dusk
cyber security

Northern Ireland is the future of British cyber security

How a perfect marriage of government and academia backing has led to a hotbed of tech talent and surge in foreign investment
1 Jul 2022
HTTP vs HTTPS: What difference does it make to security?
A close up of a browser window, showing the HTTPS protocol of a website in the URL bar
Network & Internet

HTTP vs HTTPS: What difference does it make to security?

We look at the difference between the two and tell you how to switch between them
30 Jun 2022
Securing endpoints amid new threats
Whitepaper cover with image of female employee working at home on laptopwhitepaper
Whitepaper

Securing endpoints amid new threats

Ensuring employees have the flexibility and security to work remotely
30 Jun 2022
Macmillan Publishers hit by apparent cyber attack as systems are forced offline
An abstract mock up of a blue padlock on a binary code background
Security

Macmillan Publishers hit by apparent cyber attack as systems are forced offline

Experts believe the cause of the days-long outage to be the result of ransomware, though the company has not yet confirmed the nature of the attack
30 Jun 2022
Review calls for urgent new laws over use of biometric technology
A digital render of a thumbprint, which glows blue and has strands of energy emanating from it
Policy & legislation

Review calls for urgent new laws over use of biometric technology

Report also calls for the creation of a biometrics ethics board and greater scrutiny of data sharing
30 Jun 2022
Businesses urged to abandon Microsoft Exchange legacy authentication earlier than planned
Digital padlock hovering over a screen
Security

Businesses urged to abandon Microsoft Exchange legacy authentication earlier than planned

Basic Auth will be turned off by Microsoft in October, but CISA wants all organisations to migrate from the vulnerable method as soon as possible
30 Jun 2022
FCC commissioner urges Apple and Google to remove TikTok from app stores
The ByteDance and TikTok logos displayed on a tablet and smartphone
data protection

FCC commissioner urges Apple and Google to remove TikTok from app stores

This comes after it emerged that TikTok’s owners in Beijing have repeatedly accessed sensitive data collected from US citizens
29 Jun 2022
Former Uber security chief to face fraud charges over hack coverup
Black cards of Uber logos in a row
data breaches

Former Uber security chief to face fraud charges over hack coverup

This is thought to be the first instance of a corporate information security officer criminally charged with concealing a hack
29 Jun 2022
Atos to advance NATO’s cyber security systems
A shot of the NATO headquarters surrounded by European flags
cyber attacks

Atos to advance NATO’s cyber security systems

The deal covers 22 Nato bases and ‌upgrades to two key cyber security systems
29 Jun 2022
Cyber security holds top spot in IT audit risk list
cyber
cyber attacks

Cyber security holds top spot in IT audit risk list

Privacy, data, and regulatory compliance are among other concerns facing IT audit departments
28 Jun 2022
Kaspersky finds most effective phishing emails imitate corporate messages, delivery notifications
A fishing hook rests on top of a stack of credit cards, while a padlock sits in the background out of focus
Security

Kaspersky finds most effective phishing emails imitate corporate messages, delivery notifications

Almost one in five employees clicked links in business related emails, but most emails containing threats or promising money were identified as phishi…
27 Jun 2022
Google warns of ‌ISP-controlled Hermit spyware
The Google logo on a smartphone display
malware

Google warns of ‌ISP-controlled Hermit spyware

The spyware primarily targets Android and iOS users in Italy and Kazakhstan
27 Jun 2022
LockBit 2.0 ransomware disguised as PDFs distributed in email attacks
A digital render of an envelope, floating above blue cubes and the outlines of cubes made of red energy
Security

LockBit 2.0 ransomware disguised as PDFs distributed in email attacks

Researchers have urged vigilance over compressed attachments sent under false pretenses
27 Jun 2022