Security

Marsh McLennan reveals its cyber risk analytics center
Hand hovering over laptop with padlock graphic superimposed
risk management

Marsh McLennan reveals its cyber risk analytics center

The center combines the expertise of Marsh, Guy Carpenter, Mercer, and Oliver Wyman
15 Oct 2021
What is cyber warfare?
A red world map with white pixels
Security

What is cyber warfare?

We explain what cyber warfare is and why you need to pay attention to the threats posed
15 Oct 2021
MirrorBlast phishing campaign targets financial companies
phishing hook in water surrounded by "at" symbols
phishing

MirrorBlast phishing campaign targets financial companies

Attack linked to long-standing Russian cyber crime group
15 Oct 2021
30 countries announce crackdown on ransomware payments
Ransomware on a red screen
ransomware

30 countries announce crackdown on ransomware payments

Virtual Counter-Ransomware Initiative meeting at White House lays out plans
15 Oct 2021
HPE wins networking contract with Birmingham 2022 Commonwealth Games
The poster for Birmingham 2022 Commonwealth Games outside the Library of Birmingham
Network & Internet

HPE wins networking contract with Birmingham 2022 Commonwealth Games

The company has been hired to supply edge technology with AI-driven security and management tools
15 Oct 2021
£100 contactless payment limit could place shoppers at risk, warn industry experts
Cropped view of young adult man holding plastic credit card in hand, using terminal and paying for shopping in supermarket
Policy & legislation

£100 contactless payment limit could place shoppers at risk, warn industry experts

The tech industry reacts to the new threshold introduced by the FCA
15 Oct 2021
WhatsApp backups to get end-to-end encryption
WhatsApp images with its new feature fore end-to-end encryption for backups
encryption

WhatsApp backups to get end-to-end encryption

Facebook says it's the final step towards a full end-to-end encrypted messaging experience on the chat app
15 Oct 2021
IT Pro News in Review: Microsoft’s DDoS takedown, Amazon relaxes WFH policy, West Midlands crowned UK’s top tech hub
IT Pro News in Review: Microsoft’s DDoS takedown, Amazon relaxes WFH policy, West Midlands crowned UK’s top tech hubvideo
Security

IT Pro News in Review: Microsoft’s DDoS takedown, Amazon relaxes WFH policy, West Midlands crowned UK’s top tech hub

Catch up on the biggest headlines of the week in just two minutes
15 Oct 2021
What is subnetting?
Close-up image of network fibre optic cables
Network & Internet

What is subnetting?

Partitioning a single network can help relieve network congestion and increase security
14 Oct 2021
Hackers used MSHTML exploit a week before patches were ready
"ZERO DAY" in red on a white background
zero-day exploit

Hackers used MSHTML exploit a week before patches were ready

New report finds cyber criminals automating exploit creation to help less capable hackers
14 Oct 2021
Hackers fake DocuSign and offer fraudulent signing methods
A magnifying glass focusing on the DocuSign logo as seen on its website
document management systems (DMS)

Hackers fake DocuSign and offer fraudulent signing methods

Criminals impersonate the e-signing company to steal credentials
14 Oct 2021
Best ransomware removal tools
A ransomware splash screen displayed on a laptop in an office
ransomware

Best ransomware removal tools

The top free and paid toolkits available right now to protect you from hackers
14 Oct 2021
WordPress plugin exploit puts over 90,000 sites at risk
A user with WordPress on their desktop computer
vulnerability

WordPress plugin exploit puts over 90,000 sites at risk

Security firm Wordfence recommends users of the Brizy Page Builder plugin upgrade to the latest version immediately
14 Oct 2021
Acer confirms breach after cyber attack on Indian servers
A view of Acer's headquarters in Ontario, Canada
hacking

Acer confirms breach after cyber attack on Indian servers

The attackers claim the data belongs to several million customers
14 Oct 2021
7-Eleven biometric data collection found in breach of Australian privacy laws
A view of a 7-Eleven convenience store located in Melbourne Australia
privacy

7-Eleven biometric data collection found in breach of Australian privacy laws

The US convenience store chain has been ordered to scrap its facial scanning tool and delete any stored data
14 Oct 2021
Russia missing from US-organized international ransomware event
Ransomware message on a computer screen
ransomware

Russia missing from US-organized international ransomware event

US officials blame absence on host of reasons
13 Oct 2021
Phishing campaign uses math symbol to imitate Verizon logo
Verizon sign on the side of a building
phishing

Phishing campaign uses math symbol to imitate Verizon logo

Fake logo fools victims into thinking they are dealing with the real company
13 Oct 2021
Kaspersky exposes MysterySnail zero-day exploit in Windows
A depiction of a bug on a blue binary background
zero-day exploit

Kaspersky exposes MysterySnail zero-day exploit in Windows

Elevation-of-privilege flaw could enable Chinese hackers to mount widespread spying campaign
13 Oct 2021
Australia plots harsher penalties for hackers involved in ransomware attacks
Abstract image of a padlock on a dark blue background to represent cyber security
Policy & legislation

Australia plots harsher penalties for hackers involved in ransomware attacks

The country has published its ransomware action plan as it tries to tackle the growing threat
13 Oct 2021
IBM pledges to reskill 30 million people globally by 2030
A group of people in a training session
Careers & training

IBM pledges to reskill 30 million people globally by 2030

The company is hoping to close the global digital skills gap and prepare candidates for the jobs of tomorrow
13 Oct 2021
Supply chain breaches impacted 97% of firms in the past year
Data breach in a circle connected to other circles and images
supply chain management (SCM)

Supply chain breaches impacted 97% of firms in the past year

New BlueVoyand research finds that supply chain security breaches are increasing
12 Oct 2021
GitHub revokes duplicate SSH auth keys generated by keypair library
The GitHub sign in screen on a smartphone
cyber security

GitHub revokes duplicate SSH auth keys generated by keypair library

Git client GitKraken used the affected library
12 Oct 2021
The 4 most notorious hackers
Edward Snowden picture
hacking

The 4 most notorious hackers

From Snowden to Mitnick, we trace the lives of those who hack
12 Oct 2021