Security

GitHub now supports security keys in a move away from passwords
A padlock on a motherboard surrounded by keys
Security

GitHub now supports security keys in a move away from passwords

Move to prevent account compromise for SSH Git operations
12 May 2021
Exchange Server zero-day among latest Microsoft Patch Tuesday fixes
The Microsoft Exchange Server software being accessed on a notebook device
vulnerability

Exchange Server zero-day among latest Microsoft Patch Tuesday fixes

The firm has patched three zero-day vulnerabilities across its products that haven’t yet been exploited
12 May 2021
328 security weaknesses found in Australian local government systems
A cyber attack depicted in binary code
Security

328 security weaknesses found in Australian local government systems

A report has been submitted to Parliament underlining the weaknesses of the computer environments in local government entities
12 May 2021
Cyber attacks on manufacturing up 300% in a year
A cyber attack depicted in binary code
Security

Cyber attacks on manufacturing up 300% in a year

NTT also found that application-specific and web-application attacks accounted for two-thirds of all cyber crime
11 May 2021
Train firm slammed over 'bonus' phishing test
A train operated by the West Midlands Trainline parked in a station
phishing

Train firm slammed over 'bonus' phishing test

Security experts suggest businesses use other 'lures' to avoid upsetting workers in the current climate
11 May 2021
US fuel pipeline hackers reveal their motive
The Colonial Pipeline tanks situated on a green field with clear blue sky in background
ransomware

US fuel pipeline hackers reveal their motive

Colonial Pipeline was forced to suspend 5,500 miles of pipeline between Texas and New York after hackers breached its networks
11 May 2021
Apple's AirTag tracker has already been hacked
White Apple AirTag with a smiling emoji on it
hacking

Apple's AirTag tracker has already been hacked

An IT security researcher redirected the device’s finding feature to his own website
10 May 2021
Trend Micro and Snyk team up to combat open source flaws
Open source cloud with endpoints underneath
vulnerability

Trend Micro and Snyk team up to combat open source flaws

New solution monitors trends and prioritizes issues found in open source applications
10 May 2021
Russian hackers are exploiting these 11 flaws to attack businesses
A depiction of a hacker
hacking

Russian hackers are exploiting these 11 flaws to attack businesses

The NCSC and US counterparts urge businesses to patch a handful of previously discovered flaws as soon as possible
10 May 2021
Prevent fraud and phishing attacks with DMARC
Prevent fraud and phishing attacks with DMARC - whitepaper from Mimecastwhitepaper
Whitepaper

Prevent fraud and phishing attacks with DMARC

How to use domain-based message authentication, reporting, and conformance for email security
10 May 2021
The total economic impact™ Of Mimecast
Whitepaper

The total economic impact™ Of Mimecast

Cost savings and business benefits enabled by using Mimecast with Microsoft 365
10 May 2021
Microsoft and Darktrace partner on AI-enhanced cloud security
An employee on the phone while his computer screen shows "cyber attack" warning
artificial intelligence (AI)

Microsoft and Darktrace partner on AI-enhanced cloud security

The collaboration will focus on addressing security challenges in the 'critical areas' of email security
10 May 2021
2021 state of email security report: Ransomware on the rise
2021 state of email security report: Ransomware on the rise - whitepaper from Mimecastwhitepaper
Whitepaper

2021 state of email security report: Ransomware on the rise

Securing the enterprise in the COVID world
10 May 2021
Security awareness training strategies for account takeover protection
Security awareness training strategies for account takeover protection - whitepaper from Mimecastwhitepaper
Whitepaper

Security awareness training strategies for account takeover protection

Why you need an inside-the-perimeter strategy for internal threats
10 May 2021
How to increase cyber resilience within your organisation
Cyber resilience for dummies - How to improve cyber resilience within your organisation - whitepaper from Mimecastwhitepaper
Whitepaper

How to increase cyber resilience within your organisation

Cyber resilience for dummies
10 May 2021
Don’t just educate: Create cyber-safe behaviour
How to define effective security awareness and training programmeswhitepaper
Whitepaper

Don’t just educate: Create cyber-safe behaviour

Designing effective security awareness and training programmes
10 May 2021
Employees behaving badly?
Why awareness training matters - whitepaper from Mimecastwhitepaper
cyber security

Employees behaving badly?

Why awareness training matters
10 May 2021
How to improve cyber security for remote working
How to improve cyber security for remote working - whitepaper from Mimecastwhitepaper
Whitepaper

How to improve cyber security for remote working

13 recommendations for security from any location
10 May 2021
Just 13% of iOS users opt into being tracked by third-party apps
The iPhone 12 in blue on a pink background
privacy

Just 13% of iOS users opt into being tracked by third-party apps

Most users are, as expected, choosing not be tracked following the launch of Apple’s transparency tool
10 May 2021
COVID-related phishing fuels a 15-fold increase in NCSC takedowns
A text message regarding vaccine appointments with a link
phishing

COVID-related phishing fuels a 15-fold increase in NCSC takedowns

The NCSC recorded a significant jump in the number of attacks using NHS branding to lure victims
10 May 2021
Best Linux distros 2021
Graphic introducing the showcase of the best Linux distros
operating systems

Best Linux distros 2021

Whether it's for desktop, server or security, there's bound to be a Linux distro for you
7 May 2021
Data breach exposes widespread fake reviews on Amazon
Amazon logo on the facade of one of their corporate office buildings located in Silicon Valley
data breaches

Data breach exposes widespread fake reviews on Amazon

IT security researchers found an unsecured database that shows how the scam is organized
7 May 2021
TsuNAME vulnerability could enable DDoS attacks on major DNS servers
DDoS Attack on a screen
distributed denial of service (DDOS)

TsuNAME vulnerability could enable DDoS attacks on major DNS servers

Critical flaw in DNS resolver could grind the internet to a crawl
7 May 2021