vulnerability

Visit/wannacry/34352/what-is-wannacry
WannaCry

What is WannaCry?

The full story behind one of the worst ransomware outbreaks in history
9 Sep 2019
Visit/security/34349/android-flaws-decline-in-2019-as-ios-malware-rises
Mobile phone security image
Security

Android flaws decline in 2019 as iOS malware rises

Flaws in the most popular operating systems, however, are just as dangerous as third-party bugs
6 Sep 2019
Visit/vulnerability/34184/what-s-the-difference-between-a-security-vulnerability-and-a-security-threat
Spyware Skull
vulnerability

Security vulnerabilities vs security threats

How you can protect your business against these dual concerns
17 Aug 2019
Visit/security/34226/knob-attack-lets-hackers-insert-themselves-into-your-bluetooth-calls
Security

KNOB attack lets hackers listen in on your Bluetooth calls

Vulnerability allows attackers to ‘completely break’ Bluetooth encryption
16 Aug 2019
Advertisement
Visit/cyber-security/34205/microsoft-patches-abundance-of-critical-and-wormable-windows-vulnerabilities
Microsoft's flagship OS Windows 10 on a purple graphic
cyber security

Microsoft patches abundance of Windows vulnerabilities

BlueKeep-like RCE flaws featured among the 93 bugs patched by Microsoft
14 Aug 2019
Visit/ransomware/34191/researchers-show-how-easy-it-is-to-inject-a-dslr-camera-with-ransomware
Hacked camera
ransomware

Researchers show how to inject a DSLR with ransomware

Hackers can encrypt a camera using just a Wi-Fi connection, demo shows
12 Aug 2019
Visit/security/vulnerability/354391/getting-started-with-vulnerability-mitigation
vulnerabilitywhitepaper

Getting started with vulnerability mitigation

Manage threats in plain sight
9 Aug 2019
Visit/security/vulnerability/354401/how-to-combat-shadow-it-challenges
vulnerabilitywhitepaper

How to combat shadow IT challenges

Strategies for shining a light on cloud services in your organisation
9 Aug 2019
Visit/security/34185/security-researchers-now-eligible-for-bug-hunting-iphones
iPhone X with notch
Security

Security researchers now eligible for bug-hunting iPhones

Apple also reveals tenfold increase to its bug-bounty rewards
9 Aug 2019
Visit/hacking/34175/childrens-tablet-leaks-location-and-enables-unsolicited-messages-from-strangers
Child using tablet
hacking

Children's tablet enables unsolicited messages from stranger

LeapFrog's LeapPad tablets are some of the most popular among young children and until recently, highly unsecure
8 Aug 2019
Advertisement
Visit/security/34153/microsoft-observes-russian-hackers-actively-attacking-businesses-through-iot-devices
Growling Grizzly bear with Russian hat
Security

Russian hackers are attacking businesses through IoT devices

The group known as Fancy Bear has played a role in some of the biggest hacks of recent years
6 Aug 2019
Visit/security/34127/cisco-pays-out-86m-in-damages-over-faulty-government-software
Security

Cisco pays out $8.6m over cyber security failings

Claim argues company left vulnerable video software unpatched for five years
1 Aug 2019
Advertisement
Visit/security/34109/hackers-can-bypass-visas-contactless-spending-limits
card and contactless reader
Security

Hackers can bypass Visa's contactless spending limits

The researchers and Visa disagree on the severity of the threat presented by the hack
30 Jul 2019
Visit/security/34033/why-the-telecoms-industry-is-particularly-vulnerable-to-bluekeep
Security

The telecoms industry is particularly vulnerable to BlueKeep

The industry's exposure far exceeds any other, but it's not down to incompetence
17 Jul 2019
Visit/security/34024/ncsc-hails-successful-proprietary-anti-phishing-technique
Security

NCSC hails successful proprietary anti-phishing technique

The fight against phishers is looking hopeful, but GCHQ's security arm certainly isn't without its faults
16 Jul 2019
Visit/hacking/30282/what-is-ethical-hacking-white-hat-hackers-explained
hacking

What is ethical hacking? White hat hackers explained

Not all hackers are motivated by greed - some of them use their powers for good
11 Jul 2019
Advertisement
Visit/security/33996/critical-infrastructure-at-risk-again-from-stuxnet-like-attack
Hacking
Security

Critical infrastructure at risk from Stuxnet-like attack

Researchers find gaping flaws in critical systems used in the most importnt industries across the globe
10 Jul 2019
Visit/security/33953/nhs-must-spend-now-to-prevent-devastation-of-wannacry-20
Cyber security skull
Security

NHS must spend now to prevent devastation of ‘WannaCry 2.0’

Positive moves are being made but they will count for nothing if a more sophisticated attack strikes
4 Jul 2019
Visit/two-factor-authentication-2fa/33833/google-turns-android-phones-into-2fa-keys-for-ios-login
two-factor authentication (2FA)

Google turns Android phones into 2FA keys for iOS login

FIDO keys touted as the most secure protection against hackers and phishing campaigns
13 Jun 2019
Visit/security/33779/how-mr-robot-fudged-its-hacks-to-protect-the-public
Mr. Robot poster
Security

How Mr. Robot ‘fudged’ its hacks to protect the public

Showrunners debated over how accurate to make the show’s exploits
5 Jun 2019
Visit/security/33633/critical-cisco-exploit-hands-attackers-keys-to-your-business-network
Security

Critical exploit leaves Cisco enterprise routers vulnerable

Vulnerability in popular network hardware exposes core security module to remote hacking
14 May 2019
Visit/spyware/33632/whatsapp-call-hack-installs-spyware-on-users-phones
spyware

WhatsApp call hack installs spyware on users’ phones

iPhones and Android devices are vulnerable to security flaw – WhatsApp recommends immediate app update
14 May 2019
Advertisement
Visit/security/33457/apache-fixes-dangerous-rce-flaw-in-tomcat-application-server
Security

Apache fixes dangerous RCE flaw in Tomcat application server

Vulnerability affects multiple versions of the software running on Windows
15 Apr 2019
Visit/security/33377/mobile-banking-apps-are-holding-data-insecurely
mobile banking
Security

Mobile banking apps are holding data insecurely

“Systemic problems” could allow an attacker to manipulate data, take over accounts and commit fraud
3 Apr 2019
Advertisement