The Gmail drafts folder provides hackers with a sneaky way of sharing malware, enabling them to hack deep into computers and steal user data.
When it comes to protecting your business critical applications, one cloud is a good start but two are much better. No, really.
From Dropbox, to Google, to Mimecast, there's a long list of file sharing services vying for your business's attention. Here's a guide to choosing one.
While NGFWs continue to be a vital part of an organisation's protection, they were designed for a time before advanced targeted threats started attacking our enterprises, which often go undetected.
The search engine giant has included the feature in the latest version of its Android OS, which will prevent Google from unlocking a device, even if requested to do so by police officials.
The malware has been reportedly been written by Russian language operators and developers that have used it to gather intelligence on governments and militaries in Eastern Europe.
Hackers have breached computer systems at the White House. The measures put in place to identify the attackers and prevent further compromise have shut down the White House computer network.
While a lot of security experts are content with throwing around soundbites like "we need to think outside the box" and "we need to be ahead of the game" willy-nilly, James seems different.
Keyless car crime is on the rise in London with criminals able to hack into onboard computers and start cars, and the Range Rover Evoque is one of a clutch of models to be targeted.
One passenger’s Wi-Fi hotspot name of “Al-Quida Free Terror Nettwork” caused the London-bound flight to be hit with a heavy delay as police investigated.
Authorities are advising all users of the Tor network to check their computers for malware after it emerged that a Russian hacker has been using the network to spread a powerful virus.