It has been reported that developers of Chrome browser extensions have lost control of their code after unidentified attackers compromised the…
Browsing: Identity and access management (IAM)
Following the news that the government is set to introduce a new Data Protect Bill that will give people the…
If you dismiss protection of your corporate website from cyber threats as a time-waster, you just don’t know what such…
Email is indisputably a critical enterprise communication tool essential for sending important documents quickly and efficiently between employees, managers, HR,…
Following news that the television network HBO has been hacked in which TV titles like Game of Thrones and Ballers have been…
It has been reported this morning that British Home Secretary Amber Rudd is urging messaging apps like WhatsApp to ditch end…
Recently, a senior threat intelligence analyst for Mandiant, a security company acquired by FireEye in 2014, recently became the victim…
Following the news regarding the NHS Trust, which runs St Helens and Whiston hospitals, accidentally posting hundreds of trainee doctors’…
In response to news that Mandiant Security has been the latest to bear victim of a public hack and the…
Security researchers have found vulnerabilities in one of Tesla’s cars and demonstrated that they can be exploited remotely to do things…