Attack uses multiple vectors, including NSA exploit EternalBlue
'Google holds the power of life and death over large and small businesses', says CEO Andy Yen
All businesses agree that DNS protection is important - but few are doing it
Researchers demonstrate method for wirelessly extracting AES-256 keys
Tech companies are between a rock and a hard place
Claims that unsubtle attack on Parliamentary email system was state-sponsored
Five-year deal for DeepMind's Streams app follows controversy about transfer of sensitive patient data
Multiple attempts to infiltrate Microsoft's network earlier this year
Brutal Kangaroo is a CIA tool suite for Microsoft Windows that targets closed networks by air gap jumping using thumb drives
Panel compares AWS, Azure and Google clouds. One expert admits that his firm uses machine learning just to understand the volume of AWS services it's consuming, and how much it will cost
Super Hub 2 routers have weak default passwords that are easy to crack
Celebrating the best of security
Don't worry! Microsoft has a perfectly valid excuse, honest.
Physician, heal thyself
With IoT security still a low priority, should manufacturers change their approach?
The changing business environment has created more opportunities for workers to cause a breach - not always unknowingly
New vulnerability could enable Mirai and other IoT malware to survive between device reboots
Daniel Devereux also has to follow a strict set of rules when using a smartphone, tablet or laptop under a first-of-its-kind criminal behaviour order
More than half of US SMBs now use an external service provider; that number will rise as the need for security grows.
Small organisations are less likely to be ready than large ones
NCSC lines up behind Symantec to point finger at North Korea's Lazarus group
Qualys increases visibility and security of Docker container deployments
Businesses can benefit from a single web-based management console
Qihoo 360 criticises Flashpoint's linguistic analysis as neither 'correct or professional'