Security

Best Linux distros 2021
Graphic introducing the showcase of the best Linux distros
operating systems

Best Linux distros 2021

Whether it's for desktop, server or security, there's bound to be a Linux distro for you
7 May 2021
Data breach exposes widespread fake reviews on Amazon
Amazon logo on the facade of one of their corporate office buildings located in Silicon Valley
data breaches

Data breach exposes widespread fake reviews on Amazon

IT security researchers found an unsecured database that shows how the scam is organized
7 May 2021
TsuNAME vulnerability could enable DDoS attacks on major DNS servers
DDoS Attack on a screen
distributed denial of service (DDOS)

TsuNAME vulnerability could enable DDoS attacks on major DNS servers

Critical flaw in DNS resolver could grind the internet to a crawl
7 May 2021
What is ransomware?
Male hacker hand on laptop computer keyboard with red binary screen of ransomware attack
ransomware

What is ransomware?

This type of malware could hit you hard in the pocket
7 May 2021
What are SSH keys?
SSH in textured text on a textured black background
cyber security

What are SSH keys?

A more secure alternative to establish secure communication sessions on a network
7 May 2021
Researchers show how hackers can easily 'clog up' neural networks
A female monkey and her child classified by AI
neural network

Researchers show how hackers can easily 'clog up' neural networks

The Maryland Cybersecurity Center warns deep neural networks can be tricked by adding more 'noise' to their inputs
7 May 2021
NCSC warns councils over ‘foreign influence’ in smart city projects
The UK in red and the EU in blue as seen in a digitised map
smart city

NCSC warns councils over ‘foreign influence’ in smart city projects

16-page report details cyber security and privacy risks of signing agreements with foreign state-backed companies
7 May 2021
IT Pro News in Review: Dell's decade-long bug, UK-India tech jobs boost, Facebook Workplace's bumper year
Presenter Ant Joblin on a yellow background talking to the cameravideo
Business strategy

IT Pro News in Review: Dell's decade-long bug, UK-India tech jobs boost, Facebook Workplace's bumper year

Catch up with this week's top headlines in under two minutes
7 May 2021
The IT Pro Podcast: Should companies spy on their employees?
The IT Pro Podcast: Should companies spy on their employees?
privacy

The IT Pro Podcast: Should companies spy on their employees?

Where’s the line between security and surveillance?
7 May 2021
Google’s about to push everyone into two-factor authentication
Image of two-factor authentication in action
Security

Google’s about to push everyone into two-factor authentication

“Passwords are the single biggest threat to your online security,” the company says
6 May 2021
Peloton security bug could expose user data
Peloton bike's wheels with a person's feet on the pedals
data protection

Peloton security bug could expose user data

Exposed API could let hackers access customer data
6 May 2021
Weekly threat roundup: Dell, Apple, Qualcomm
Graphic showing a red unlocked padlock surrounded by blue locked padlocks
vulnerability

Weekly threat roundup: Dell, Apple, Qualcomm

Pulling together the most dangerous and pressing flaws that businesses need to patch
6 May 2021
Qualcomm modem flaw puts millions of Android users at risk
The Android robot in front of lines of code
Google Android

Qualcomm modem flaw puts millions of Android users at risk

Vulnerability found in the chipmaker's Mobile Station Modem could allow hackers to listen to user conversations, although Qualcomm has downplayed the …
6 May 2021
Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems
depatment of defenve buiding
ethical hacking

Defense Dept. expands vulnerability disclosure program to all publicly accessible defense systems

This move allows greater research and reporting of bugs to Pentagon
5 May 2021
Security researchers take control of a Tesla via drone
Tesla factory
ethical hacking

Security researchers take control of a Tesla via drone

Cyber security researchers found a way to unlock the car doors with a Wi-Fi dongle
5 May 2021
Best free malware removal tools 2021
Malware spotted in red code on black background
Security

Best free malware removal tools 2021

Worried your device is infected? Here are the tools you need to get rid of malicious software
5 May 2021
COVID vaccine passports will fail unless government wins public trust, ICO warns
The Information Commissioner Elizabeth Denham
privacy

COVID vaccine passports will fail unless government wins public trust, ICO warns

Data watchdog's chief Elizabeth Denham warns that it’s not good enough to claim ‘this is important, so trust us’
5 May 2021
Dell patches vulnerability affecting hundreds of computer models worldwide
Dell XPS 15
cyber security

Dell patches vulnerability affecting hundreds of computer models worldwide

The vulnerability stems from a Dell driver allowing attackers to bypass security products
5 May 2021
Acuant acquires identity verification provider Hello Soda
HelloSoda logo on a white backgorund
mergers and acquisitions

Acuant acquires identity verification provider Hello Soda

Hello Soda’s dark web solution scans over 600 million records for signs of data theft
4 May 2021
X-Force threat intelligence index
X Force threat intelligence indexwhitepaper
Whitepaper

X-Force threat intelligence index

Understand the threat landscape with fresh intelligence
4 May 2021
Tens of thousands of Pennsylvanians health data exposed following data breach
Locks on a screen with one open and in red
data protection

Tens of thousands of Pennsylvanians health data exposed following data breach

Coronavirus tracing company is at the heart of the exposure
4 May 2021
Microsoft launches open source tool Counterfeit to prevent AI hacking
Microsoft logo suspended above a conference floor
artificial intelligence (AI)

Microsoft launches open source tool Counterfeit to prevent AI hacking

Businesses can use preloaded attack algorithms to test their machine learning systems
4 May 2021
Apple patches exploited iOS and macOS WebKit flaws
An anonymous mobile phone user using their device in a darkened room
zero-day exploit

Apple patches exploited iOS and macOS WebKit flaws

iPhone, iPad, Apple Watch users may have been subject to arbitrary code execution
4 May 2021