Many IT managers would prefer to believe that the bring-your-own-device (BYOD) phenomenon (a) does not really exist, or (b) can be safely ignored. These people would be advised to check their server logs,...
IT systems at Redcar and Cleveland Borough Council have been down for three weeks
KrØØk vulnerability affecting Broadcom and Cypress WLAN chips could enable attackers to decrypt wireless network packets
New security vulnerability could affect nearly one billion devices worldwide
Ecommerce platform compromised by eight different skimmers hosted accounts for a number of high-profile organisations
UK plays host to 149 unpatched Pulse Secure VPN servers vulnerable to flaw favoured by Iranian state-backed hackers
Unsigned firmware in peripherals could allow attackers to target HP, Lenovo and Dell computers, researchers warn
Enterprises must assess the 'firmware posture' of new devices during procurement