Security

Tesla wins case against ex-employee accused of stealing data
cyber crime

Tesla wins case against ex-employee accused of stealing data

The company celebrates its latest victory against Martin Tripp, who was accused of hacking and sharing sensitive information
18 Sep 2020
Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web
trojans

Android users told to be on high alert after Cerberus banking Trojan leaks to the dark web

The source code for the authenticator-breaking malware is available for free on underground forums
18 Sep 2020
Mozilla finally shuts down Firefox Send
Graphic representing the Firefox Send service
malware

Mozilla finally shuts down Firefox Send

Service abandoned after it was exploited by hackers to spread malware
18 Sep 2020
Big data is 'giving us an edge over hackers' for the first time, says Microsoft CISO
Data on screen, viewed by shadowy hacker
Security

Big data is 'giving us an edge over hackers' for the first time, says Microsoft CISO

Massive amounts of network, endpoint, application and identity signals are being used to train machine learning models and improve detection
17 Sep 2020
How to protect against a DDoS attack
Security

How to protect against a DDoS attack

DDoS attacks are increasing - here's how to fight back
17 Sep 2020
Google bans ‘stalkerware’ from Play store
spyware

Google bans ‘stalkerware’ from Play store

The ban excludes enterprise management tools and those used by parents to track the whereabouts of their children
17 Sep 2020
Universities and colleges told to prepare for a wave of cyber attacks
ransomware

Universities and colleges told to prepare for a wave of cyber attacks

Education providers should instal safeguards ahead of new term start, warns UK security agency
17 Sep 2020
The best remote access solutions
Software

The best remote access solutions

We round up the top remote access software for mobile workers, including those with collaboration, screen sharing and support tools
16 Sep 2020
Plans to share pregnant women’s alcohol intake ‘could breach GDPR’
General Data Protection Regulation (GDPR)

Plans to share pregnant women’s alcohol intake ‘could breach GDPR’

BPAS says move would be in contravention of GDPR and the Data Protection Act 2018
16 Sep 2020
Microsoft open-sources fuzzing tool used for bug-ridden Windows 10
software development

Microsoft open-sources fuzzing tool used for bug-ridden Windows 10

Developers can access the vulnerability detection tool through Github as Microsoft shifts away from its legacy scheme
16 Sep 2020
Why IT leaders should consider a zero trust network access strategy
cloud securitywhitepaper

Why IT leaders should consider a zero trust network access strategy

Enabling business while staying secure
16 Sep 2020
Uber claims it makes London "safer" in TfL licence battle
Policy & legislation

Uber claims it makes London "safer" in TfL licence battle

The ride-hailing service says it has improved systems to verify drivers' insurance documents and identification
16 Sep 2020
MFA bypass allows hackers to infiltrate Microsoft 365
cloud security

MFA bypass allows hackers to infiltrate Microsoft 365

Hackers could exploit errors in the ‘inherently insecure’ protocol implemented on widely-used cloud services
15 Sep 2020
'Largest ever' Magecart hack compromises 2,000 online stores
hacking

'Largest ever' Magecart hack compromises 2,000 online stores

The personal details of tens of thousands of customers were stolen from just one compromised Magento-powered site
15 Sep 2020
Data breach exposes details of 18,000 people who tested positive for COVID-19
data breaches

Data breach exposes details of 18,000 people who tested positive for COVID-19

Human error sees Welsh residents' details leaked for 20 hours on a public-facing server
15 Sep 2020
What is private browsing?
Security

What is private browsing?

Private-browsing capabilities are baked into the internet browsers you use everyday. Here's why it's important
15 Sep 2020
What is cyber warfare?
Security

What is cyber warfare?

We explain what cyber warfare is and why you need to pay attention to the threats posed
14 Sep 2020
Simplify to secure
enterprise securitywhitepaper

Simplify to secure

Reduce complexity by integrating your security ecosystem
14 Sep 2020
Zenhua data leak contained Boris Johnson's personal data
data governance

Zenhua data leak contained Boris Johnson's personal data

Information on the prime minister has been collected by a Shenzen firm with alleged links to the Chinese Communist Party
14 Sep 2020
England and Wales' contact-tracing app will launch this month
Development

England and Wales' contact-tracing app will launch this month

The NHS app ensures that users’ data is stored on their smartphones as opposed to a public database
14 Sep 2020
Zoom finally rolls out two-factor authentication
two-factor authentication (2FA)

Zoom finally rolls out two-factor authentication

The tool is to help organisations prevent identity theft and security breaches
11 Sep 2020
Bluetooth advocacy group warns of critical encryption exploit
vulnerability

Bluetooth advocacy group warns of critical encryption exploit

The vulnerability allows third-parties to overwrite the key used to establish a link between two devices
11 Sep 2020
What is fileless malware?
malware

What is fileless malware?

This near-invisible threat can go virtually undetected by even the most advanced antivirus software
10 Sep 2020