
Dell software exposes security flaw
Dell has admitted that it as unintentionally installed software on their machines that contains a serious security flaw that can be taken advantage of.
Past important security information, including timely alerts and advice on prevailing threats and general good counsel on organisational IT security.
Dell has admitted that it as unintentionally installed software on their machines that contains a serious security flaw that can be taken advantage of.
The iPhone’s operating system source code has apparently been leaked online.
Symantec’s State of Privacy report has found that consumers in the UK don’t believe that the government and businesses do enough to ensure their data is secure.
A new family of ransomware has come about called Locky Ransomware. While it follows the same pattern as other Ransomware by encrypting local files and holding the private encryption keys at ransom, the deployment has some minor differences.
Cyber Security Breaches Survey has found that two-thirds of large UK enterprises have been victims of a cyber-attack in the last year.
Instant communication giant WhatsApp has confirmed that End-to-End encryption will be applied to all its services.
Leading security firm, Symantec, has vocalised its concerns about the growing popularity of malware designed to target OS X and IOS (Apple’s mobile operating system). Symantec states that the amount of malware has almost doubled this year.
Companies need to consider the risks as well as the benefits of Android’s operating system, warn experts.
The popularity of cloud computing and mobile technologies growing has brought with it more security challenges – and experts believe that security technologies and cross-industry collaboration are key to security success going forward.
Studies conducted by Intel Security discovered that up to 94% of users were unable to tell the difference between genuine emails and a phishing attempt.
The latest release of news bulletins have been released from Microsoft for April 2015 and ten out of eleven are related to vulnerabilities with the windows OS. Three of these could allow remote code execution, in this the limitation of how destructive it can be is what privileges the compromised account has.
The most common form of reminder for a forgotten password is email, from your colleague sending the password over for an encrypted document to amazon sending a new password. Most people pride themselves that their password is safe and no one can guess it but what if you didn’t permanently delete the email after memorising the password?
A report produced by Verizon has found that from the start of a phishing campaign to its first successful victim takes only a worrying 82 seconds.
Users should not be the first to receive the blame for a successful phishing attack, says security awareness expert.
There was a 40% increase in the number cyber-attacks carried out on large companies in 2014, as criminals hijack infrastructures and attack from within, according to IT security firm Symantec.
The internet can be dangerous and there is always someone trying to use its massive reach for their own personal illegitimate gain. Being yet another victim of hacking is becoming common place now due to the vast amount of devices that are connected to the internet - but this doesn’t need to be the case.