Feedback

Security

Our top 5 scariest pieces of tech

19 hours ago  by Sam Pudwell
Our top 5 scariest pieces of tech
The scariest day of the year is upon us, so now feels like the perfect time to run through what we think are the most frightening, alarming and downright creepy technologies out there at the moment.

Why malvertising could be your business number one problem

20 hours ago  by Terry Greer-King
Why malvertising could be your business number one problem
According to Cisco's recent Mid Year Security report it is likely that the growth in malvertising (online advertising used to spread malware) is partly responsible for the surge in web malware.

Frankencloud: 5 reasons to be terrified of cloud apps this Halloween

21 hours ago  by Paul Cooper
Frankencloud: 5 reasons to be terrified of cloud apps this Halloween
This Halloween, it’s not the ghouls and goblins that give us the biggest scare. It’s cloud apps. But don’t look too closely because they’re also pretty scary. Here are five reasons why.

Who's flying drones over France's nuclear power plants?

22 hours ago  by Paul Cooper
Who's flying drones over France's nuclear power plants?
Mysterious drone sightings over nuclear power plants have been confounding French authorities in recent weeks, and have led to an investigation. But who's behind the sightings?

Hackers using Gmail drafts to steal data and update malware

30 Oct 2014  by Tom Phelan
Hackers using Gmail drafts to steal data and update malware
The Gmail drafts folder provides hackers with a sneaky way of sharing malware, enabling them to hack deep into computers and steal user data.

Why are two clouds better than one?

30 Oct 2014  by Orlando Scott-Cowley
Why are two clouds better than one?
When it comes to protecting your business critical applications, one cloud is a good start but two are much better. No, really.

How to choose the right file sharing service for your business

30 Oct 2014  by Orlando Scott-Cowley
How to choose the right file sharing service for your business
From Dropbox, to Google, to Mimecast, there's a long list of file sharing services vying for your business's attention. Here's a guide to choosing one.

If next generation firewalls don't evolve, they'll soon be irrelevant

30 Oct 2014  by Sean Newman
If next generation firewalls don't evolve, they'll soon be irrelevant
While NGFWs continue to be a vital part of an organisation's protection, they were designed for a time before advanced targeted threats started attacking our enterprises, which often go undetected.

Google to encrypt user data as default on Android 5.0 Lollipop

29 Oct 2014  by Barclay Ballard
Google to encrypt user data as default on Android 5.0 Lollipop
The search engine giant has included the feature in the latest version of its Android OS, which will prevent Google from unlocking a device, even if requested to do so by police officials.

FireEye uncovers Russian malware with hint of government backing

29 Oct 2014  by Jamie Hinks
FireEye uncovers Russian malware with hint of government backing
The malware has been reportedly been written by Russian language operators and developers that have used it to gather intelligence on governments and militaries in Eastern Europe.

White House down: Computer systems hacked by unconfirmed assailant

29 Oct 2014  by Paul Cooper
White House down: Computer systems hacked by unconfirmed assailant
Hackers have breached computer systems at the White House. The measures put in place to identify the attackers and prevent further compromise have shut down the White House computer network.