Source: itpro.co.uk

Malware hiding Android apps return to Google Play after a simple name change

Malware hiding Android apps return to Google Play after a simple name change

Under the prevailing threat of ransomware, physical security is being forgotten

Under the prevailing threat of ransomware, physical security is being forgotten

Watchdog faces probe after data leak

Watchdog faces probe after data leak

TSB outage: Now TSB warns of phishing attacks targeting customers

TSB outage: Now TSB warns of phishing attacks targeting customers

Hackers are increasingly exploiting cryptojacking malware without needing active browsers

Hackers are increasingly exploiting cryptojacking malware without needing active browsers

Smart home mobile apps vulnerable to takeover

Smart home mobile apps vulnerable to takeover

Is facial recognition fit for purpose?

Is facial recognition fit for purpose?

Phishing attacks primary concern for two-thirds of BDMs

Phishing attacks primary concern for two-thirds of BDMs

Apple macOS malware soared 270% in 2017

Apple macOS malware soared 270% in 2017

UK businesses are 'slow' to adopt multi-factor authentication

UK businesses are 'slow' to adopt multi-factor authentication

'BuckHacker' search tool lets users trawl through unsecure AWS buckets

'BuckHacker' search tool lets users trawl through unsecure AWS buckets

Cryptocurrency miners: the latest tool for cyber criminals

Cryptocurrency miners: the latest tool for cyber criminals

How to use machine learning and AI in cyber security

How to use machine learning and AI in cyber security

A guide to cyber security certification and training

A guide to cyber security certification and training

UK cops to lose access to Europol's cyber crime resources after Brexit

UK cops to lose access to Europol's cyber crime resources after Brexit

UK government trains teenage hackers in £20m scheme

UK government trains teenage hackers in £20m scheme