network security

Apple drops controversial firewall-bypass feature on macOS
A mouse hovering over the Safari logo on a MacBook
firewalls

Apple drops controversial firewall-bypass feature on macOS

Researchers claim the ContentFilterExlusionList posed a huge cyber security risk
15 Jan 2021
Channel Pro Insight: A fast guide to central network management
A fast guide to central network management - whitepaperwhitepaper
Whitepaper

Channel Pro Insight: A fast guide to central network management

How to stay connected and secure with central network management
13 Jan 2021
What is public key infrastructure (PKI)?
Graphic representing security in either data protection or cyber security contexts
Security

What is public key infrastructure (PKI)?

This technology can help secure data using a number of components
12 Jan 2021
What is zero trust?
Key lit up on a dark background of 1s and 0s
network security

What is zero trust?

How a zero trust security strategy better protects your business from internal and external attackers
11 Jan 2021
AWS CISO urges companies to adopt a zero-trust security approach
Security lock cyber protection
Security

AWS CISO urges companies to adopt a zero-trust security approach

Steve Schmidt outlines how his entire security strategy is based around the zero-trust philosophy
9 Dec 2020
Russian hackers are exploiting critical VMware flaws
Abstract silhouette of a computer hacker in front of a Russian flag
Security

Russian hackers are exploiting critical VMware flaws

The vulnerabilities were patched last week, but the NSA has uncovered details of active exploitation
8 Dec 2020
2FA bypass flaw on cPanel threatens the security of 70 million domains
A man using 2FA on his smartphone to access a service on his laptop
Security

2FA bypass flaw on cPanel threatens the security of 70 million domains

Hackers were able to try as many 2FA codes as they wanted using brute force methods before landing on the right one
25 Nov 2020
Secure your Wi-Fi against hackers in 10 steps
Abstract image showing a Wi-Fi logo on a cyber security background
Security

Secure your Wi-Fi against hackers in 10 steps

Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
23 Nov 2020
Microsoft expands Defender capabilities for Linux systems
The logs of a Linux server as shown on a display
Security

Microsoft expands Defender capabilities for Linux systems

Defender for Endpoint customers will be able to detect and remediate advanced threats involving Linux servers
18 Nov 2020
CMS platforms succumb to KashmirBlack botnet as businesses rush online
Visual representation of an active botnet, with several black nodes connected with white strands
Security

CMS platforms succumb to KashmirBlack botnet as businesses rush online

Businesses warned to prioritise security as coronavirus forces many to ply their trade digitally
22 Oct 2020
Mobile browser flaw exposes users to spoofing attacks
An anonymous mobile phone user using their device in a darkened room
Security

Mobile browser flaw exposes users to spoofing attacks

Safari and Opera Touch browsers are among those which can be exploited to target victims with malware
21 Oct 2020
Managing employee security risks during lockdown
Security

Managing employee security risks during lockdown

COVID-19 doesn’t have to compromise your organisation’s security
20 Oct 2020
Weekly threat roundup: Nvidia, BitLocker, and HackerOne
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
Security

Weekly threat roundup: Nvidia, BitLocker, and HackerOne

The most dangerous and pressing flaws from the week gone by
2 Oct 2020
BT and Toshiba reveal UK’s first "unhackable" quantum-secure network
Network & Internet

BT and Toshiba reveal UK’s first "unhackable" quantum-secure network

The network aims to show how the Quantum Key Distribution can be used to secure data traffic between industrial sites
1 Oct 2020
Secure your Wi-Fi against hackers in 10 steps
Abstract image showing a Wi-Fi logo on a cyber security background
network security

Secure your Wi-Fi against hackers in 10 steps

Lock down your Wi-Fi network and find devices that are stealing your bandwidth – and, potentially, your data
29 Sep 2020
Flightradar24 struck by three cyber attacks in two days
A photograph of the Flightradar24 website home page
cyber attacks

Flightradar24 struck by three cyber attacks in two days

The continued onslaught has knocked the flight tracker offline as its engineers work to restore services
29 Sep 2020
What is shadow IT?
Man holding mobile phone over laptop with double exposure city overlay
Security

What is shadow IT?

Hardware and software that isn't authorised by IT departments can leave businesses vulnerable
29 Sep 2020
Zyxel ZyWall ATP100 review: Cost-effective, but not cloudy
unified threat management (UTM)

Zyxel ZyWall ATP100 review: Cost-effective, but not cloudy

This security solution brings a good set of protection features to small businesses on a budget
29 Sep 2020
How to install Kali Linux on Raspberry Pi
Security

How to install Kali Linux on Raspberry Pi

Follow these simple steps to install the penetration testing software on the compact computer for mobile hacking
22 Sep 2020
Firefox flaw let hackers hijack Android browser over Wi-Fi
The installation Firefox page for the app on an Android device
vulnerability

Firefox flaw let hackers hijack Android browser over Wi-Fi

Mozilla has rushed out a fix for the bug that bears resemblance to an RCE flaw
22 Sep 2020
Windows Server flaw sparks emergency US gov warning
vulnerability

Windows Server flaw sparks emergency US gov warning

All government agencies had four days to patch their systems against a CVSS 10-rated elevation of privilege flaw
21 Sep 2020
Big data is 'giving us an edge over hackers' for the first time, says Microsoft CISO
A concept image of a hacker behind a stream of binary
Security

Big data is 'giving us an edge over hackers' for the first time, says Microsoft CISO

Massive amounts of network, endpoint, application and identity signals are being used to train machine learning models and improve detection
17 Sep 2020
Bluetooth advocacy group warns of critical encryption exploit
vulnerability

Bluetooth advocacy group warns of critical encryption exploit

The vulnerability allows third-parties to overwrite the key used to establish a link between two devices
11 Sep 2020