Security
Show me:
- malware
- identity theft
- information security (InfoSec)
- enterprise security
- encryption
- touch ID
- spyware
- distributed denial of service (DDOS)
- e safety
- scams
- biometrics
- two-factor authentication (2FA)
- cyber security
- vulnerability
- The Shadow Brokers (TSB)
- single sign-on (SSO)
- internet security
- laptop security
- firewalls
- ethical hacking
- data encryption standards (DES)
- cyber terrorism
- cyber crime
- phishing
- zero-day exploit
- network security
- trojans
- SSL & SSL certificates
- endpoint security
- social engineering
- cyber warfare
- ransomware
- denial of service (DOS)
- penetration testing
- data breaches
- privacy
- Privacy Shield
- hacking
- unified threat management (UTM)
- National Cyber Security Centre (NCSC)
- cross-site scripting (XSS)
- bugs
- exploits
- WannaCry
- identity and access management (IAM)
- cyber attacks
- antivirus
- botnets
- Advanced Encryption Standard (AES)
- security, information and event management (SIEM)
Visit/security/privacy/354293/apple-admits-iphone-11-overrides-settings-to-track-users-locations

Apple admits iPhone 11 ‘overrides settings’ to track users’ locations
A tracking feature is still enabled after users switch off all location tracking for apps and system services
6 Dec 2019
Visit/security/identity-and-access-management-iam/354289/44-million-microsoft-customers-found-using

44 million Microsoft customers found using compromised passwords
The company has issued widespread password resets for those affected
6 Dec 2019
Visit/mobile/5g/354286/why-5g-could-be-a-cyber-security-nightmare

Why 5G could be a cyber security nightmare
The latest generation of mobile connectivity promises many marvellous things, but it could also be a hacker's dream
6 Dec 2019
Visit/security/bugs/354287/hackerone-bug-bounty-platform-breached-by-its-own-user

HackerOne bug bounty platform breached by its own user
The bug bounty specialist paid the hacker responsible a cool $20,000 for their efforts
6 Dec 2019
Visit/security/cyber-security/354284/labour-mp-targeted-by-russian-phishing-campaign

Labour MP ‘targeted by Russian phishing campaign’
Putin critic claims he received malware-loaded documents that claimed to reveal disinformation efforts
5 Dec 2019
Visit/security/cyber-crime/354253/europol-seizes-more-than-30000-counterfeit-sites-on-cyber-monday

Europol seizes more than 30,000 counterfeit sites on Cyber Monday
The joint operation resulted in three arrests based on 26,000 luxury goods taken from the cyber criminals
3 Dec 2019
Visit/security/cyber-security/354246/millions-of-text-messages-leaked-through-exposed-truedialog-server

Millions of text messages leaked through exposed TrueDialog server
Database of 604GB included unencrypted passwords and the contents of SMS messages
2 Dec 2019
Visit/security/trojans/354242/national-crime-agency-brings-down-prolific-trojan-marketplace

National Crime Agency brings down prolific Trojan marketplace
Imminent Methods sold IM-RAT malware for as little as $25
2 Dec 2019
Visit/security/privacy/354241/stop-leaking-your-identity

Stop leaking your identity
Are you inadvertently sharing sensitive information online? We reveal how to identify data leaks and plug the holes in your privacy
2 Dec 2019
Visit/disaster-recovery-dr/33803/tips-to-improve-your-disaster-recovery-strategy

Nine tips to improve your disaster recovery strategy
Whether you have a well-rehearsed DR plan in place or are just starting out, here's how to take your strategy to the next level
29 Nov 2019
Visit/security/hacking/354233/dead-netflix-accounts-reactivated-by-hackers

Dead Netflix accounts reactivated by hackers
Former users are being charged months after cancelling subscriptions, according to reports
29 Nov 2019
Visit/security/cyber-security/354224/security-flaws-prevalent-in-applications-produced-by-software

Security flaws prevalent in applications produced by software vendors
Secure development is the key to a secure application
29 Nov 2019
Visit/security/cyber-security/354226/how-to-build-an-effective-cyber-resilience-strategy

How to build an effective cyber resilience strategy
Don’t let your organisation be caught unprepared
29 Nov 2019
Visit/business-strategy/startups/354216/gitguardian-the-security-startup-hunting-down-online-secrets-to

GitGuardian, the security startup hunting down online secrets to keep companies safe from hackers
More than 3,000 company credentials unwittingly end up online everyday. GitGuardian helps firms plug these leaks
29 Nov 2019
Visit/security/data-breaches/354219/adobe-discloses-magento-marketplace-data-breach

Adobe discloses Magento Marketplace data breach
The e-commerce platform was taken offline after a hacker accessed customer data and commercial information
28 Nov 2019
Visit/business/policy-legislation/354218/german-double-murderer-wins-right-to-be-forgotten-case

German double murderer wins 'right to be forgotten' case
The latest in a long line of high-profile cases to result in a win for the complainant
28 Nov 2019
Visit/security/enterprise-security/354215/what-is-devsecops-and-why-is-it-important

What is DevSecOps and why is it important?
This new flavour of DevOps is helping organisations rapidly implement security by design
27 Nov 2019
Visit/security/spyware/354214/nso-group-workers-sue-facebook-for-blocking-private-accounts

NSO Group workers sue Facebook for blocking private accounts
The action comes after WhatsApp sued the firm for its alleged role in the Pegasus video hack
27 Nov 2019
Visit/security/cyber-security/354211/cyber-security-skills-shortage-near-breaking-point

Cyber security skills shortage near breaking point
A lack of government interest and Brexit is widening the skills gap, say UK IT decision-makers
27 Nov 2019
Visit/security/internet-security/354194/sir-tim-berners-lee-champions-new-rules-designed-to-fix-the

Sir Tim Berners-Lee champions new rules designed to 'fix the internet'
The internet luminary wants the tech industry and governments to hold each other to account
25 Nov 2019
Visit/security/data-breaches/354192/t-mobile-data-breach-affects-more-than-a-million-users

T-Mobile data breach affects more than a million users
The company has given no indication as to whether any personal information has been stolen
25 Nov 2019
Visit/security/bugs/354180/google-to-offer-15m-to-anyone-that-can-break-a-pixel-4

Google to offer $1.5m to anyone that can break a Pixel 4
In a bid to make its Titan technology more secure, Google takes a page out of Apple's playbook
22 Nov 2019
Visit/security/cyber-security/354174/biometric-data-leaks-and-targeted-ransomware-to-dominate-2020-threat

Biometric data leaks and targeted ransomware to dominate 2020 threat landscape
Expect attackers to go after devices previously overlooked
21 Nov 2019