Security
Show me:
- botnets
- biometrics
- antivirus
- Advanced Encryption Standard (AES)
- ethical hacking
- firewalls
- hacking
- unified threat management (UTM)
- network security
- National Cyber Security Centre (NCSC)
- malware
- laptop security
- cross-site scripting (XSS)
- internet security
- bugs
- information security (InfoSec)
- cyber attacks
- identity theft
- encryption
- identity and access management (IAM)
- cyber security
- zero-day exploit
- WannaCry
- vulnerability
- two-factor authentication (2FA)
- exploits
- trojans
- touch ID
- enterprise security
- The Shadow Brokers (TSB)
- endpoint security
- SSL & SSL certificates
- spyware
- e safety
- social engineering
- cyber warfare
- single sign-on (SSO)
- distributed denial of service (DDOS)
- security, information and event management (SIEM)
- scams
- cyber terrorism
- ransomware
- cyber crime
- Privacy Shield
- data breaches
- privacy
- data encryption standards (DES)
- phishing
- denial of service (DOS)
- penetration testing
South Korean public sector organisations targeted by Gwisin ransomware

South Korean public sector organisations targeted by Gwisin ransomware
Threat actors tailored attacks on victims such as pharmaceutical companies, with researchers still in the dark on key details
8 Aug 2022
Why convenience is the biggest threat to your security

Why convenience is the biggest threat to your security
The shortcuts and human error that lead to breaches - and how to guard against them
8 Aug 2022
VMware warns of tumultuous threats amid Russia-Ukraine cyber war

VMware warns of tumultuous threats amid Russia-Ukraine cyber war
New report underscores burned-out security teams' response to geopolitically motivated cyber attacks
8 Aug 2022
What is Dark Utilities C2 as a service (C2aaS)?

What is Dark Utilities C2 as a service (C2aaS)?
Hackers can use the service to launch cyber attacks with ease for as little as £8.50
8 Aug 2022
Microsoft blocking Tutanota users from Teams registration, claims fix unfeasible

Microsoft blocking Tutanota users from Teams registration, claims fix unfeasible
Tutanota claim this is an antitrust issue, as the company shares the problem with the public
8 Aug 2022
Cyber attack on software supplier causes "major outage" across the NHS

Cyber attack on software supplier causes "major outage" across the NHS
Unconfirmed reports suggest the attack may be ransomware-related, while the NHS contends with disrupted services on the 111 non-emergency line
8 Aug 2022
Brave pushes the boundaries of privacy by design

Brave pushes the boundaries of privacy by design
It’s quite a big step to abandon the big three of Chrome, Edge and Safari for a niche option that doesn’t just tack privacy on top
6 Aug 2022
Home Office to collect foreign offenders' biometric data using smartwatch scheme

Home Office to collect foreign offenders' biometric data using smartwatch scheme
Facial recognition and geolocation data will be matched against Home Office, Ministry of Justice and police databases
5 Aug 2022
Nomad happy to forgive hackers if they return 90% of $190 million that was stolen

Nomad happy to forgive hackers if they return 90% of $190 million that was stolen
The crypto bridge is offering 'white hat hackers' a 10% bounty following the attack earlier this week
5 Aug 2022
Decade-old malware strains top annual list of most pervasive business exploits

Decade-old malware strains top annual list of most pervasive business exploits
Allied cyber security authorities say the most active strains of 2021 have been in operation for longer than five years, and are being constantly deve…
5 Aug 2022
Cyber attacks rain on Taiwan during Pelosi visit

Cyber attacks rain on Taiwan during Pelosi visit
IP addresses from China and Russia were said to have been responsible for the attack
5 Aug 2022
Malware operators abusing Windows shortcuts to bypass VBA macro block

Malware operators abusing Windows shortcuts to bypass VBA macro block
The likes of Emotet and Qakbot, as well as Russia-linked state-sponsored hackers, have all pivoted to the new infection technique
5 Aug 2022
Fortinet unveils ‘fastest’ compact firewall for hyperscale data centers and 5G networks

Fortinet unveils ‘fastest’ compact firewall for hyperscale data centers and 5G networks
The new FortiGate 4800F firewall series packs 2.4 Tbps of capacity into a compact 4RU form-factor
4 Aug 2022
North Korean-linked Gmail spyware 'SHARPEXT' harvesting sensitive email content

North Korean-linked Gmail spyware 'SHARPEXT' harvesting sensitive email content
The insidious software exfiltrates all mail and attachments, researchers warn, putting sensitive documents at risk
4 Aug 2022
Thoma Bravo adds Ping Identity to growing cyber security portfolio in $2.8 billion acquisition

Thoma Bravo adds Ping Identity to growing cyber security portfolio in $2.8 billion acquisition
The intelligent identity company joins Proofpoint and Sophos, among others, as it looks to accelerate its cloud transformation
4 Aug 2022
Auditors blame massive $4 million cryptocurrency heist on leaky logging technology

Auditors blame massive $4 million cryptocurrency heist on leaky logging technology
Investigators raised concern over the thousands of vulnerable wallets containing Solana, USDC and other tokens
4 Aug 2022
India scraps privacy bill following big tech outcry

India scraps privacy bill following big tech outcry
However, the government is developing a new bill which it hopes to bring into law early next year
4 Aug 2022
How to incorporate password protection into your security strategy 

How to incorporate password protection into your security strategy
A comprehensive security strategy needs to incorporate password protection
3 Aug 2022
Over 200,000 DrayTek routers vulnerable to total device takeover

Over 200,000 DrayTek routers vulnerable to total device takeover
The routers are popular with small and medium businesses, but are easily exploitable by threat actors seeking to steal data or launch ransomware
3 Aug 2022
Google Cloud and MITRE make it easier for businesses to threat-hunt in their cloud environments

Google Cloud and MITRE make it easier for businesses to threat-hunt in their cloud environments
The new pre-built queries aim to make it easier to navigate cloud security for organisations without the deep understanding that's required to effecti…
3 Aug 2022
Microsoft unveils new threat intelligence and surface management solutions

Microsoft unveils new threat intelligence and surface management solutions
New Microsoft Defender offerings aim to offer deeper insights into threat actors and their behaviours
3 Aug 2022
Tory party delays leadership selection over hacking fears

Tory party delays leadership selection over hacking fears
The Conservatives have also been forced to abandon plans to allow members to change their vote later in the contest
3 Aug 2022
Legal challenge for Sadiq Khan over ANPR expansion, Met access to data

Legal challenge for Sadiq Khan over ANPR expansion, Met access to data
Rights campaigners argue that the increase in surveillance is unlawful and unjustified
3 Aug 2022