A failure to report high-severity vulnerabilities often happens with open-source projects — vulnerabilities are discovered, disclosed to relevant parties and…
Browsing: Malware and Vulnerabilities
With the Summer holidays coming to an end, students across the UK will soon be returning to the classroom. As preparations…
Few are confident in spotting security risks and vulnerabilities in DevOps operated public cloud environments A majority of European…
The breach suffered last year by credit rating agency, Equifax, when details of more than 145 million U.S. customers was…
Global ransomware attacks are increasingly linked to nation states, with the lines between politics and crime often blurring, Europe’s police…
Operationalizing cybersecurity has been a major challenge for oil and gas engineers to date. With their primary priority to maintain…
The state of workplace mobility The continued white-hot proliferation of personal devices has led to businesses adopting cultures where employees…
It has been reported by Krebs that Government Payment Service Inc. — a company used by thousands of U.S. state…
With a recent security analysis of cyber-attacks against universities and colleges in the UK has discovered that staff or students could be…
One in every one hundred emails represent a phishing or malicous email according to a study by FireEye. Thomas Pore,…