Security

Tech giants begin work on a digital wallet for coronavirus vaccination records
A verifiable vaccination certificate on a smartphone
data protection

Tech giants begin work on a digital wallet for coronavirus vaccination records

The Vaccination Credential Initiative will look to develop a digital certificate to store on mobile devices
15 Jan 2021
Employees behaving badly
Why awareness training matters - whitepaper from Mimecastwhitepaper
cyber security

Employees behaving badly

Why awareness training matters
15 Jan 2021
Apple drops controversial firewall-bypass feature on macOS
A mouse hovering over the Safari logo on a MacBook
firewalls

Apple drops controversial firewall-bypass feature on macOS

Researchers claim the ContentFilterExlusionList posed a huge cyber security risk
15 Jan 2021
Google closes Fitbit deal despite ongoing legal probes
The box packaging of a Fitbit Versa device in front of a screen displaying the Google homepage
mergers and acquisitions

Google closes Fitbit deal despite ongoing legal probes

US and Australian regulators are still investigating whether the $2.1 billion (£1.54bn) acquisition will harm competition and user privacy
15 Jan 2021
Cyber criminals bypassing MFA to access cloud service accounts
Smartphone and tablet displaying two-factor authentication screens
two-factor authentication (2FA)

Cyber criminals bypassing MFA to access cloud service accounts

Pass-the-cookie attacks help sidestep organizational security
14 Jan 2021
Weekly threat roundup: Microsoft Defender, Adobe, Mimecast
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: Microsoft Defender, Adobe, Mimecast

Pulling together the most dangerous and pressing flaws that businesses need to patch
14 Jan 2021
Microsoft remains the most-spoofed brand for the second quarter in a row
A sign in page for a Microsoft service
phishing

Microsoft remains the most-spoofed brand for the second quarter in a row

Malicious use of the tech giant's brand increased by 24% in the last quarter of 2020, according to Check Point
14 Jan 2021
Capcom data breach adds another 40,000 estimated victims
CAPCOM logo on a smartphone screen
data breaches

Capcom data breach adds another 40,000 estimated victims

The gaming company now estimates up to 390,000 have been affected
13 Jan 2021
Mimecast admits hackers accessed users’ Microsoft accounts
Mimecast logo seen displayed on a smartphone
Security

Mimecast admits hackers accessed users’ Microsoft accounts

'Sophisticated' threat actors obtained one of Mimecast's digital certificates and abused it to gain access to clients' accounts
13 Jan 2021
Microsoft fixes actively exploited Defender zero-day flaw
A Windows update ready to be installed on a laptop
zero-day exploit

Microsoft fixes actively exploited Defender zero-day flaw

The firm's latest Patch Tuesday release includes fixes for a total of 83 vulnerabilities across Windows, Azure and more
13 Jan 2021
Channel Pro Insight: A fast guide to central network management
A fast guide to central network management - whitepaperwhitepaper
Whitepaper

Channel Pro Insight: A fast guide to central network management

How to stay connected and secure with central network management
13 Jan 2021
World’s largest dark web marketplace taken offline
Closeup of a criminal's wrists in handcuffs
cyber crime

World’s largest dark web marketplace taken offline

A multinational operation also involving Europol, UK and US authorities has put a halt to illegal trade valued at approximately £125 million
13 Jan 2021
SolarWinds hackers first breached systems in September 2019
Image of a cyber criminal using several computers in a dark room
Security

SolarWinds hackers first breached systems in September 2019

The company is facing a class action lawsuit filed by its shareholders
12 Jan 2021
What is public key infrastructure (PKI)?
Graphic representing security in either data protection or cyber security contexts
Security

What is public key infrastructure (PKI)?

This technology can help secure data using a number of components
12 Jan 2021
Parler suffers data leak before being taken offline
Parler and Twitter app logos on a screen
social media

Parler suffers data leak before being taken offline

Hackers could combine leaked data with phishing emails to exploit users
12 Jan 2021
What is a 502 bad gateway and how do you fix it?
502 Bad Gateway page that pops up when a website has a connection issue with its server
web hosting

What is a 502 bad gateway and how do you fix it?

We explain what this networking error means for users and website owners
12 Jan 2021
BIOS security: The next frontier for endpoint protection
How to stop breaches at BIOS level - whitepaper from Dellwhitepaper
Whitepaper

BIOS security: The next frontier for endpoint protection

Today’s threats upend traditional security measures
12 Jan 2021
Hackers may have accessed personal data in Ubiquiti Networks breach
Unknown hacker on a computer in a dark room
hacking

Hackers may have accessed personal data in Ubiquiti Networks breach

The security incident with a third-party cloud provider has forced the firm to ask users to reset passwords
12 Jan 2021
Android malware vendor teams with marketer to promote new malware
Red skull and crossbones atop binary code
malware

Android malware vendor teams with marketer to promote new malware

Rogue malware can take over devices and exfiltrate data, warns researchers
11 Jan 2021
10 quick tips for identifying phishing emails
Hacker behind screen
scams

10 quick tips for identifying phishing emails

Avoid falling victim to a phishing attack with these easy tips
11 Jan 2021
United Nations suffers potential data breach
The UN building with flags in front
data breaches

United Nations suffers potential data breach

Hackers could have breached the database long before the UN applied a patch
11 Jan 2021
How to reclaim data from Google, Facebook, Apple post-GDPR
GDPR depicted by binary code in a European flag formation
General Data Protection Regulation (GDPR)

How to reclaim data from Google, Facebook, Apple post-GDPR

We reveal how the web's biggest data hoarders have responded to the new regulations and how you can take control of your privacy
11 Jan 2021
What is zero trust?
Key lit up on a dark background of 1s and 0s
network security

What is zero trust?

How a zero trust security strategy better protects your business from internal and external attackers
11 Jan 2021
Two sentenced under the Computer Misuse Act for data theft
Code on a screen before fingers typing onto a keyboard
Computer Misuse Act

Two sentenced under the Computer Misuse Act for data theft

The individuals were accused of siphoning away personal data from RAC to an accident claims management firm
11 Jan 2021