Security

Visit/security/ransomware/354171/microsoft-issues-statement-debunking-teams-ransomware-rumours
Ransomware splash screen mockup
ransomware

Microsoft issues statement debunking Teams ransomware rumours

Rumours also claimed ransomware was being installed via the BlueKeep exploit
21 Nov 2019
Visit/vulnerability/34849/thousands-of-businesses-vulnerable-to-severe-oracle-ebs-flaws
vulnerability

Thousands of businesses vulnerable to 'severe' Oracle EBS flaws

The suite of enterprise products can be exploited for financial fraud and theft
20 Nov 2019
Visit/privacy/34848/ico-investigates-brexit-party-for-failing-to-hand-over-personal-data
privacy

ICO investigates Brexit Party for failing to hand over personal data

The data watchdog is keeping an eye on personal data as a political campaign asset
19 Nov 2019
Visit/security/cyber-security/354128/understanding-your-open-source-risk
cyber securitywhitepaper

Understanding your open source risk

Open source libraries can introduce vulnerabilities to your code
19 Nov 2019
Advertisement
Visit/privacy/34821/delete-your-private-data-automatically
privacy

Delete your private data automatically

Here's how to make files, messages and other data vanish automatically after a specific length of time
19 Nov 2019
Visit/security/cyber-security/354127/report-the-state-of-software-security
cyber securitywhitepaper

Report: The State of Software Security

This annual report explores important trends in software security
19 Nov 2019
Visit/security/cyber-security/354123/how-do-vulnerabilities-get-into-software
cyber securitywhitepaper

How do vulnerabilities get into software?

90% of security incidents result from exploits against defects in software
19 Nov 2019
Visit/security/cyber-security/354118/application-security-fallacies-and-realities
cyber securitywhitepaper

Application security fallacies and realities

Web application attacks are the most common vulnerability, so what is the truth about application security?
19 Nov 2019
Visit/hacking/34845/thousands-of-disney-accounts-hijacked
hacking

Thousands of Disney+ accounts hijacked

Hackers exploited the video streaming service just hours after it launched
19 Nov 2019
Visit/ransomware/34840/another-us-state-government-hit-with-ransomware-following-a-brief-reprieve
ransomware

Another US state government hit with ransomware, following a brief reprieve

Louisiana becomes the latest in a very long line of US public sector bodies to fall victim to ransomware
19 Nov 2019
Advertisement
Visit/encryption/34832/interpol-to-support-the-breaking-of-end-to-end-encryption
encryption

Interpol to support the breaking of end-to-end encryption

Law enforcement agency argues the technology frustrates the investigative process
18 Nov 2019
Visit/policy-legislation/34834/us-huawei-ban-to-be-postponed-for-another-three-months
Policy & legislation

US Huawei ban to be postponed for another three months

Extension will be the third reprieve since the embargo was issued
18 Nov 2019
Advertisement
Visit/general-data-protection-regulation-gdpr/34830/microsoft-overhauls-its-privacy-policy-amid-eu
General Data Protection Regulation (GDPR)

Microsoft overhauls its privacy policy amid EU concerns

Data processing responsibilities will be clearly defined on all commercial cloud contracts as of early 2020
18 Nov 2019
Visit/bugs/34827/tech-giants-band-together-to-form-the-github-security-lab
bugs

Tech giants band together to form the GitHub Security Lab

The likes of Mozilla, Intel and Oracle have joined with Microsoft for the open-source project
15 Nov 2019
Visit/data-insights/analytics/354044/leveraging-advanced-analytics-to-detect-user-security-threats
analyticswhitepaper

Leveraging advanced analytics to detect user security threats

Deliver a unified, contextual, and secure digital workspace
15 Nov 2019
Visit/security/network-security/354040/how-your-network-can-take-on-the-cloud-and-win
network securitywhitepaper

How your network can take on the cloud - and win

Think beyond traditional networking toward a secure digital perimeter
15 Nov 2019
Advertisement
Visit/technology/34817/djis-rogue-drone-app-helps-pinpoint-a-pilots-precise-location
Technology

DJI's rogue drone app helps pinpoint a pilot's precise location

App is dismissed by experts as being insufficient for fighting illegal drone use
14 Nov 2019
Visit/business-strategy/34816/google-joins-big-tech-banking-with-personal-checking-accounts
Google 'G' sign on phone in dark room
Business strategy

Google joins big tech banking with personal checking accounts

The tech giant is the latest to muscle further into the financial services industry
14 Nov 2019
Visit/cyber-security/34815/home-office-app-for-eu-citizens-vulnerable-to-hackers
cyber security

Home Office app for EU citizens vulnerable to hackers

'Little technical skill' needed to breach app built to help EU nationals settle in the UK
14 Nov 2019
Visit/cyber-security/34809/trickbot-trojan-named-the-most-dangerous-threat-to-healthcare
cyber security

TrickBot trojan named the most dangerous threat to healthcare

A lack of funding and legacy technology has led to the growing severity of healthcare's security landscape
13 Nov 2019
Visit/ransomware/34808/ransomware-as-a-service-threat-targeting-enterprise-servers
ransomware

‘Ransomware as a service’ threat targeting enterprise servers

The PureBasic-written malware is highly unconventional and has ties to well-known organisations
13 Nov 2019
Visit/mobile-security/34807/5g-networks-are-vulnerable-to-hacking
mobile security

5G networks are vulnerable to hacking

New research uncovers nearly a dozen more flaws in the next generation of mobile network
13 Nov 2019
Advertisement
Visit/cyber-security/34806/facebook-fixes-ios-1322-bug-that-launched-users-cameras-without-authorisation
cyber security

Facebook fixes iOS 13.2.2 bug that launched users' cameras without authorisation

The issue has angered users who think the company is exploiting the app to spy on them
13 Nov 2019
Visit/security/27098/best-vpn-services
Security

Best VPN services for 2019

VPN services tried and tested
12 Nov 2019
Advertisement