Security

Google coding typo effectively bricks Chrome OS devices
Chromebook logo of the HP Pro c640 Chromebook
operating systems

Google coding typo effectively bricks Chrome OS devices

A hastily released update prevented users from logging into their machines
23 Jul 2021
Attacks on remote council staff increased 213% during pandemic
A remote worker having IT issues
cyber attacks

Attacks on remote council staff increased 213% during pandemic

Only 47% of councils have increased their IT budget to provide security training for remote workers
23 Jul 2021
UK gun owners urged to be ‘vigilant’ after Guntrader data breach
A person unloading a hunting shotgun
data breaches

UK gun owners urged to be ‘vigilant’ after Guntrader data breach

100,000 customer names and addresses have been published to the dark web
23 Jul 2021
Kaseya mysteriously obtains master REvil decryptor from ‘third party’
A chained lock situated on a laptop displaying a red screen
ransomware

Kaseya mysteriously obtains master REvil decryptor from ‘third party’

The company is now working to restore access to affected customers
23 Jul 2021
IT Pro News in Review: AWS cuts ties with NSO Group, IBM's strong growth, and HP patches hidden bug
An HP printer overlaid on a background of IBM's Q computervideo
Business strategy

IT Pro News in Review: AWS cuts ties with NSO Group, IBM's strong growth, and HP patches hidden bug

Catch up on the most important news of the week in just two minutes
23 Jul 2021
What is Maze Ransomware?
Ransomware message on a computer screen
ransomware

What is Maze Ransomware?

This Windows ransomware has targeted many organizations worldwide
22 Jul 2021
Six ways boards can step up support for cyber security
A corporate boardroom filled with empty chairs against a long table
Business strategy

Six ways boards can step up support for cyber security

Security is an enterprise-wide risk management concern, not merely an IT issue
22 Jul 2021
CISA warns of disguised malware on hacked Pulse Secure devices
Red skull and crossbones atop binary code
malware

CISA warns of disguised malware on hacked Pulse Secure devices

CISA lists several tasks administrators can complete to boost security
22 Jul 2021
Weekly threat roundup: Windows 11, Cloudflare, Google Chrome
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: Windows 11, Cloudflare, Google Chrome

Pulling together the most dangerous and pressing flaws that businesses need to patch
22 Jul 2021
Preparing for AI-enabled cyber attacks
AI icon against a laptop icon on a yellow background - whitepaper from Darktracewhitepaper
Whitepaper

Preparing for AI-enabled cyber attacks

MIT technology review insights
22 Jul 2021
British man 'PlugWalkJoe' arrested in Spain over 2020 Twitter hack
metal handcuffs on laptop keyboard
hacking

British man 'PlugWalkJoe' arrested in Spain over 2020 Twitter hack

Joseph James O'Connor is also accused of hijacking TikTok and Snapchat user accounts, as well as cyberstalking a juvenile
22 Jul 2021
Microsoft acquires security startup CloudKnox
The Microsoft sign outside its headquarters
cloud security

Microsoft acquires security startup CloudKnox

The tech giant continues to expand its security portfolio to secure its own cloud services
22 Jul 2021
The five essentials from your endpoint security partner
Five essentials from your endpoint security partner - title against a background of blue circles - whitepaper from Malwarebyteswhitepaper
Whitepaper

The five essentials from your endpoint security partner

Empower your MSP business to operate efficiently
22 Jul 2021
Judge forces Capitol rioter to unlock laptop using facial recognition
Capitol building with smoke surrounding it and rioters on it
biometrics

Judge forces Capitol rioter to unlock laptop using facial recognition

Prosecutors argued that the Microsoft device could contain footage of the 6 January insurrection
22 Jul 2021
One third of cyber security pros report experiencing workplace harassment
Businesswoman Being Gossiped About By Colleagues In Office
Careers & training

One third of cyber security pros report experiencing workplace harassment

Respect in Security has called on companies to make it easier and safer for employees to report harassment
22 Jul 2021
New malware uses search engine ads to target pirate gamers
Skull and crossbones on a computerized background
malware

New malware uses search engine ads to target pirate gamers

MosaicLoader uses advanced obfuscation techniques to avoid detection
21 Jul 2021
Google Cloud beefs up security following surge in ransomware attacks
Abstract image of a padlock above a large ransomware sign to symbolise cyber security
cloud security

Google Cloud beefs up security following surge in ransomware attacks

Financial services, retail, and healthcare sectors have been especially vulnerable to ransomware attacks
21 Jul 2021
16-year-old flaw haunts millions of HP, Xerox and Samsung printers
An HP Pagewide Pro 452dw printer
vulnerability

16-year-old flaw haunts millions of HP, Xerox and Samsung printers

The severe vulnerability centres on a printer driver that installs itself on user’s machines, sometimes without their knowledge
21 Jul 2021
DuckDuckGo launches email privacy service
DuckDuckGo app on a smartphone
email providers

DuckDuckGo launches email privacy service

The private search company will mask user addresses and remove email trackers
20 Jul 2021
US has new cyber security rules for pipelines
Long pipeline heading toward a mountain range
Policy & legislation

US has new cyber security rules for pipelines

DHS now requires “urgently needed protections against cyber intrusions”
20 Jul 2021
Hackers abuse single bit change in Intel CPU register to evade detection
Macro view of modern multicore CPU processor in human hand with PC computer motherboard in background
malware

Hackers abuse single bit change in Intel CPU register to evade detection

Palo Alto Networks discovers that Trap Flag is being abused to notify malware it is being analyzed
20 Jul 2021
AWS shuts down NSO Group infrastructure
A yellow and white AWS sign hanging in front of a building
Amazon Web Services (AWS)

AWS shuts down NSO Group infrastructure

The Israeli company’s Pegasus spyware was used to target at least 50,000 mobile phones
20 Jul 2021
The pros and cons of facial recognition technology
A woman's face being scanned by facial recognition technology
privacy

The pros and cons of facial recognition technology

Is it really worth risking user privacy in the name of efficiency and security?
20 Jul 2021
Northern ticket machines hit by ransomware
Woman purchasing ticket from Northern Railway's self-service vending machine
ransomware

Northern ticket machines hit by ransomware

The incident comes just two months after the rail operator invested £17 million in 621 new self-service machines
20 Jul 2021