Quantcast
Channel: Latest
Browsing latest articles
Browse All 42 View Live

Image may be NSFW.
Clik here to view.

Santander rolls out blockchain-powered foreign exchange app

News One Pay FX will use Ripple's blockchain technology to accelerate payments across borders

View Article



Image may be NSFW.
Clik here to view.

One year after WannaCry, zero NHS trusts pass cyber security assessment

News Damning government report reveals NHS still fails to meet cyber security requirements

View Article

Image may be NSFW.
Clik here to view.

Intel won’t patch new Spectre-like chip vulnerabilities for another 12 days

News Patches for all operating systems and virtual machines may not be ready until later this year - report

View Article

Image may be NSFW.
Clik here to view.

Google and Microsoft discover new Spectre variant

News But patching Speculative Store Bypass flaw could hit performance by up to 8%, warns Intel

View Article

Image may be NSFW.
Clik here to view.

Champions League final 'faces hacking threat'

News Ukrainian state security accuses Russia of preparing huge attack as Cisco details VPNFilter threat

View Article


Image may be NSFW.
Clik here to view.

Meltdown and Spectre: Samsung Galaxy S7 vulnerable to Meltdown hack

News The flaw potentially effects tens of millions of users that still own the S7

View Article

Image may be NSFW.
Clik here to view.

Mobile point-of-sale exploit exposes customers to card fraud

News Devices from PayPal, Square, iZettle and SumUp all found to contain critical security flaws

View Article

Image may be NSFW.
Clik here to view.

Facebook pulls Onavo app after violating Apple's privacy rules

News Apple asked Facebook to "voluntarily" delist the app as it collects data on other smartphone software

View Article


Image may be NSFW.
Clik here to view.

The A-Z of security threats 2018

In-depth Industry experts give their thoughts on the growing range of threats facing modern businesses

View Article


Image may be NSFW.
Clik here to view.

Researchers expose 'critical vulnerabilities' in SSD encryption

News Hardware-based encryption far less secure than presumed with attackers able to access data without passwords

View Article

Image may be NSFW.
Clik here to view.

Mirai 'botmasters' now exploiting Hadoop flaw to target Linux servers

News Malware used to take half the internet offline is being used to build powerful botnets with just a handful of compromise

View Article

Image may be NSFW.
Clik here to view.

Three key pillars of threat visibility

In-depth For a company to see what threats they’re up against, they need visibility into all the data available

View Article

Image may be NSFW.
Clik here to view.

Kaspersky Internet Security 2019 review: Unbeatable value

Reviews Old reliable does it again, with supreme effectiveness, extensive features and minimal performance impact 5

View Article


Image may be NSFW.
Clik here to view.

Flaws in 4G and 5G could allow attackers to launch DoS attacks and track...

News Researchers present their findings just as manufacturers gear up to launch wave of 5G-ready handsets

View Article

Image may be NSFW.
Clik here to view.

Microsoft makes Windows Defender ATP available for Windows 7 and 8.1 devices

News The move was delayed by more than six months and comes less than a year before Windows 7 support expires

View Article


Image may be NSFW.
Clik here to view.

Panda Free Antivirus review: Bamboo-zle the hackers

Reviews Panda remains our top choice for free AV protection, with a fresh look and less pushy reminders 4

View Article

Image may be NSFW.
Clik here to view.

McAfee Internet Security 2019 review: Redemption at last

Reviews The old dog has finally learnt some new tricks 4

View Article


Image may be NSFW.
Clik here to view.

Is your weakest link really where you think it is?

News Hacking is a reality of modern business life but that doesn’t mean you have to admit defeat just yet…

View Article

Image may be NSFW.
Clik here to view.

Samsung Galaxy S10’s ultrasonic sensor fooled by fake finger

News Samsung’s in-display fingerprint reader can be hacked ‘in 15 minutes’

View Article

Image may be NSFW.
Clik here to view.

Three ways to secure your printer

In-depth Your office printer is a sitting target for hackers, so what can you do to secure it?

View Article

Image may be NSFW.
Clik here to view.

Kaspersky Endpoint Security for Business Advanced review: On-prem security...

Reviews Excellent device protection for modern businesses 4

View Article


Image may be NSFW.
Clik here to view.

GoldBrute botnet targeting Windows RDP systems in brute force hacking spree

News More than 1.5 million unique IP addresses have been compromised with the figure only expected to rise

View Article


Image may be NSFW.
Clik here to view.

50% of cyber attacks now use island hopping

News Financial, retail and manufacturing businesses are in the firing line of this increasingly popular cyber attack method

View Article

Image may be NSFW.
Clik here to view.

What is ethical hacking? White hat hackers explained

In-depth Not all hackers are motivated by greed - some of them use their powers for good

View Article

Image may be NSFW.
Clik here to view.

KNOB attack lets hackers insert themselves into your Bluetooth calls

News Vulnerability allows attackers to ‘completely break’ Bluetooth encryption

View Article


Image may be NSFW.
Clik here to view.

Carbon Black execs reveal post-acquisition plans

In-depth Security firm's CEO and CTO talk integration, growth and Gelsinger

View Article

Image may be NSFW.
Clik here to view.

What are Meltdown and Spectre and are you affected?

Tutorials A guide to the CPU security flaws and their flawed patches

View Article

Image may be NSFW.
Clik here to view.

What is WannaCry?

In-depth The full story behind one of the worst ransomware outbreaks in history

View Article

Image may be NSFW.
Clik here to view.

Four strategies organisations are using to combat cyber attacks

In-depth AI, machine learning, technical integration and flexible tools are leading the way

View Article



Image may be NSFW.
Clik here to view.

Pen testers arrested after breaking into courthouse that hired them

News Specialists claim they were testing ‘physical’ vulnerability points as part of a cyber assessment

View Article

Image may be NSFW.
Clik here to view.

Patch management vs vulnerability management

In-depth What exactly is patch management, and why should IT pros sit up and take notice of doing it properly?

View Article

Image may be NSFW.
Clik here to view.

Magecart skimmers are targeting large public Wi-Fi networks for payment details

News Russian-linked cyber criminals are compromising industrial-sized routers for their large data banks

View Article

Image may be NSFW.
Clik here to view.

Mastering endpoint security implementation

In-depth More devices connecting to the corporate network means more security risks.

View Article


Image may be NSFW.
Clik here to view.

This tool can work out how often your company will be hit by insider attacks

News Size, sector and employee welfare all used as factors of email-based intrusion

View Article

Image may be NSFW.
Clik here to view.

Avast Business Patch Management review: Don’t give up the day job just yet

Reviews Good Windows patch management services but a work in progress 2

View Article

Image may be NSFW.
Clik here to view.

Hackers 'are no longer winning', says KPMG cyber chief

News Despite progress over the past two years, a wealth of threats still plague both the public and private sectors

View Article


Image may be NSFW.
Clik here to view.

Cloud storage: How secure are Dropbox, OneDrive, Google Drive and iCloud?

In-depth How the big cloud vendors stack up when it comes to encrypting and protecting your data

View Article


Image may be NSFW.
Clik here to view.

Microsoft partners with device and chip makers on ‘secured-core’ PCs

News Secured-core PCs aim to mitigate firmware cyber security threats

View Article

Image may be NSFW.
Clik here to view.

Could Virgin Galactic’s IPO indicate an interstellar step change for cyber...

Analysis When we think about the cyber attacks of the future, we may have to think bigger

View Article

Image may be NSFW.
Clik here to view.

First mass BlueKeep exploitation spotted in the wild

News Amateurish coin mining attack discovered six months after the critical Microsoft vulnerability was discovered

View Article
Browsing latest articles
Browse All 42 View Live


Latest Images