Last week, the National Society for the Prevention of Cruelty to Children (NSPCC) released a report in a bid to raise understanding of the impact of end-to-end encryption (E2EE) on children’s... Read more »
A degree of mystery surrounds the provenance of a newly discovered cache of confidential source code data that was left exposed and accessible in a misconfigured Microsoft Azure Blob... Read more »
Users of Apple mobile devices are being urged to upgrade their phones and tablets to the latest version of iOS 14.5 in order to mitigate the impact of a... Read more »
A team of four girls from Highgate School in North London have been crowned the winners of the National Cyber Security Centre’s (NCSC’s) CyberFirst Girls Competition after beating more... Read more »
When you think about email security, you think of suppliers such as Mimecast or Proofpoint, whose marque pops up at the bottom of millions of business emails as a... Read more »
French police unlawfully intercepted text messages from tens of thousands of encrypted phones in an operation that led to thousands of arrests across Europe, lawyers claim. Investigators from France’s... Read more »
To avoid a technological future dictated by hostile nation states, it is more vital then ever for the UK to invest in developing sovereign technologies in areas such as... Read more »
Threat researchers at RiskIQ’s Atlas intelligence unit have gleaned potentially important new insight into the infrastructure and tactics used in the SolarWinds cyber espionage campaign from the firm’s network... Read more »
Cyber security leaders across EMEA are prioritising investments in security orchestration automation, zero-trust and API-based security as they attempt to optimise their network security postures as they face up... Read more »
The operators of a remote access trojan (RAT) dubbed ToxicEye are managing their cyber crime campaign by exploiting features of the secure Telegram instant messaging service, cyber researchers at... Read more »