Why we need to reset the debate on end-to-end encryption to protect children

Last week, the National Society for the Prevention of Cruelty to Children (NSPCC) released a report in a bid to raise understanding of the impact of end-to-end encryption (E2EE) on children’s... Read more »

Leaky Azure storage account puts software developer IP at risk

A degree of mystery surrounds the provenance of a newly discovered cache of confidential source code data that was left exposed and accessible in a misconfigured Microsoft Azure Blob... Read more »

Apple OS updates patch multiple security holes

Users of Apple mobile devices are being urged to upgrade their phones and tablets to the latest version of iOS 14.5 in order to mitigate the impact of a... Read more »

North London school wins NCSC girls’ cyber challenge

A team of four girls from Highgate School in North London have been crowned the winners of the National Cyber Security Centre’s (NCSC’s) CyberFirst Girls Competition after beating more... Read more »

The Security Interviews: Making sense of outbound email security

When you think about email security, you think of suppliers such as Mimecast or Proofpoint, whose marque pops up at the bottom of millions of business emails as a... Read more »

French legal challenge over EncroChat cryptophone hack could hit UK prosecutions

French police unlawfully intercepted text messages from tens of thousands of encrypted phones in an operation that led to thousands of arrests across Europe, lawyers claim. Investigators from France’s... Read more »

GCHQ: Cyber investment a guarantor of UK’s global status

To avoid a technological future dictated by hostile nation states, it is more vital then ever for the UK to invest in developing sovereign technologies in areas such as... Read more »

Researchers shed more light on APT29 activity during SolarWinds attack

Threat researchers at RiskIQ’s Atlas intelligence unit have gleaned potentially important new insight into the infrastructure and tactics used in the SolarWinds cyber espionage campaign from the firm’s network... Read more »

Automation, zero-trust, API-based security priorities for EMEA CISOs

Cyber security leaders across EMEA are prioritising investments in security orchestration automation, zero-trust and API-based security as they attempt to optimise their network security postures as they face up... Read more »

ToxicEye malware exploits Telegram messaging service

The operators of a remote access trojan (RAT) dubbed ToxicEye are managing their cyber crime campaign by exploiting features of the secure Telegram instant messaging service, cyber researchers at... Read more »
Subscribe to our Newsletter