According to recent news reports, a 19-year old vulnerability that enabled attackers to decrypt encrypted data and sign communications sites’ secret…
Browsing: Data Protection
In 2018, no executive that reads the papers can be unaware of the cybersecurity risks facing their organisation. With the…
The Daily Mail reported yesterday afternoon that a Google researcher discovered a huge security flaw in Windows 10 that could have allowed…
A vulnerability in Windows that has been around for decades is being exploited by hackers behind a new version of…
With the ever-expanding influx of Internet Embedded Technology (IET) within businesses, such as printers, conferencing solutions, building security technology, heating,…
According to the 2016 Verizon Data Breach Incident Report, the vast majority of cyberattacks were successful due to individual error.…
Nine out of 10 employees use USB devices, but only 20 percent of them are leveraging encryption POWAY, CA –…
An innovative UK first, Bournemouth is accepting digital identity app Yoti as a form of ID, allowing people to leave…
VULNERABILITY DESCRIPTION A team of researchers, including Tripwire VERT’s Craig Young has announced that TLS stacks from at least 8 different vendors are…
Research shows that, on average, more than 4,000 ransomware attacks have occurred daily since January 1, 2016. Ransomware is a…