Top 10 breaches of 2014 attacked ‘old vulnerabilities’, says HP
A report by HP has found that 44 percent of all of the breaches in 2014 were caused by known vulnerabilities, between two and four…
A report by HP has found that 44 percent of all of the breaches in 2014 were caused by known vulnerabilities, between two and four…
The Ramnit botnet that is said to have affected 3.2 million computers has been shut down by European police. 26 Feb 2015 • , 1…
A pair of possible exploits in hardware and software used for playing Blu-ray discs have come to light, reports PC World. 02 Mar 2015 • …
A widespread, long-standing security flaw that allows attackers to decrypt HTTPS-protected traffic between certain device and potentially millions of websites has been uncovered by security…
There are many female researchers and computer experts who contribute to the field, helping everyone enjoy safer technology. We spoke to one of the most…
An attempt to silence feminism blog Femsplain backfires on DDoS attackers, as they only help to raise its profile. 09 Mar 2015 • , 1…
A number of seemingly unconnected Western websites were hacked over the weekend, with messages claiming Islamic State as the perpetrator. 09 Mar 2015 • ,…
ESET assess the differences between CryptoFortress and TorrentLocker: two very different strains of ransomware. Marc-Etienne M.Léveillé 09 Mar 2015 • , 1 min. read Last…
iOS and OS X the most vulnerable operating systems? Don’t confuse vulnerabilities with exploits, or patch frequency with insecurity. 10 Mar 2015 • , 6…
Apple fans keen to get their hands on the Apple Watch are advised to think before they click, after hackers exploited a wave of enthusiasm…
One thing Microsoft has been very public about is Windows 10’s new strategy of releasing patches to update the operating system at different times for…
IT teams’ time is always limited, and it doesn’t help when other things get in the way. Here’s seven things that waste your IT team’s…