cyber security

Data breach exposes widespread fake reviews on Amazon
Amazon logo on the facade of one of their corporate office buildings located in Silicon Valley
data breaches

Data breach exposes widespread fake reviews on Amazon

IT security researchers found an unsecured database that shows how the scam is organized
7 May 2021
TsuNAME vulnerability could enable DDoS attacks on major DNS servers
DDoS Attack on a screen
distributed denial of service (DDOS)

TsuNAME vulnerability could enable DDoS attacks on major DNS servers

Critical flaw in DNS resolver could grind the internet to a crawl
7 May 2021
What are SSH keys?
SSH in textured text on a textured black background
cyber security

What are SSH keys?

A more secure alternative to establish secure communication sessions on a network
7 May 2021
The IT Pro Podcast: Should companies spy on their employees?
The IT Pro Podcast: Should companies spy on their employees?
privacy

The IT Pro Podcast: Should companies spy on their employees?

Where’s the line between security and surveillance?
7 May 2021
Peloton security bug could expose user data
Peloton bike's wheels with a person's feet on the pedals
data protection

Peloton security bug could expose user data

Exposed API could let hackers access customer data
6 May 2021
Security researchers take control of a Tesla via drone
Tesla factory
ethical hacking

Security researchers take control of a Tesla via drone

Cyber security researchers found a way to unlock the car doors with a Wi-Fi dongle
5 May 2021
Best free malware removal tools 2021
Malware spotted in red code on black background
Security

Best free malware removal tools 2021

Worried your device is infected? Here are the tools you need to get rid of malicious software
5 May 2021
Dell patches vulnerability affecting hundreds of computer models worldwide
Dell XPS 15
cyber security

Dell patches vulnerability affecting hundreds of computer models worldwide

The vulnerability stems from a Dell driver allowing attackers to bypass security products
5 May 2021
X-Force threat intelligence index
X Force threat intelligence indexwhitepaper
Whitepaper

X-Force threat intelligence index

Understand the threat landscape with fresh intelligence
4 May 2021
Microsoft launches open source tool Counterfeit to prevent AI hacking
Microsoft logo suspended above a conference floor
artificial intelligence (AI)

Microsoft launches open source tool Counterfeit to prevent AI hacking

Businesses can use preloaded attack algorithms to test their machine learning systems
4 May 2021
Apple patches exploited iOS and macOS WebKit flaws
An anonymous mobile phone user using their device in a darkened room
zero-day exploit

Apple patches exploited iOS and macOS WebKit flaws

iPhone, iPad, Apple Watch users may have been subject to arbitrary code execution
4 May 2021
What is subnetting?
Close-up image of network fibre optic cables
Network & Internet

What is subnetting?

Partitioning a single network can help relieve network congestion and increase security
30 Apr 2021
Hackers used SonicWall zero-day flaw to plant ransomware
Ransomware on a red screen
ransomware

Hackers used SonicWall zero-day flaw to plant ransomware

Ransomware group UNC2447 used an SQL injection bug to attack US and European orgs
30 Apr 2021
The IT Pro Podcast: Thinking differently about security
The IT Pro Podcast: Thinking differently about security
Security

The IT Pro Podcast: Thinking differently about security

How eBay Classifieds Group keeps its users secure in a changing world
30 Apr 2021
New report highlights the need for diversity in cyber security recruitment
People sitting in an open office setting
cyber security

New report highlights the need for diversity in cyber security recruitment

Only half of cyber security pros had dedicated security education
28 Apr 2021
What is cloud security?
Blue square background with a yellow cloud superimposed, with a cut-out key icon on it to represent cloud security
Security

What is cloud security?

Storing data in the cloud has many benefits, but failure to secure it can lead to very real consequences
28 Apr 2021
Hackers could abuse legitimate Windows AD FS to steal data
padlock in a tech setting
Microsoft Windows

Hackers could abuse legitimate Windows AD FS to steal data

The flaw in Microsoft authentication servers could enable threat actors to perform a Golden SAML attack
28 Apr 2021
Average ransomware costs have more than doubled in 2021
Abstract image of a padlock above a large ransomware sign to symbolise cyber security
ransomware

Average ransomware costs have more than doubled in 2021

The average cost of recovery from attacks is now close to $2 million
28 Apr 2021
Reverb exposes 'millions' of customer records on unsecured server
Blue binary data on a black background
data protection

Reverb exposes 'millions' of customer records on unsecured server

Leaked records contained data including full names, email addresses, phone numbers and mailing addresses
27 Apr 2021
Thoma Bravo to acquire Proofpoint for $12.3 billion
A hand holding a smartphone displaying the Proofpoint logo
mergers and acquisitions

Thoma Bravo to acquire Proofpoint for $12.3 billion

The sale of the cyber security company will net shareholders $176 per share
27 Apr 2021
Microsoft and Intel join forces to defend against cryptojacking
Cryptocyrrency stock markets
cyber security

Microsoft and Intel join forces to defend against cryptojacking

The companies are using machine learning for advanced memory scanning, cryptojacking and ransomware detection
27 Apr 2021
E-commerce fraud to surpass $20 billion this year
Computer showing e-commerce transaction
Security

E-commerce fraud to surpass $20 billion this year

Research finds merchants need to do more to implement fraud prevention
26 Apr 2021
NETSCOUT threat intelligence report
Threat intelligence report - whitepaper from NETSCOUTwhitepaper
Whitepaper

NETSCOUT threat intelligence report

Cyber crime: Exploiting a pandemic
26 Apr 2021