NZ privacy lead John Edwards named new information commissioner

New Zealand’s serving privacy commissioner John Edwards has been selected by the UK government as the preferred candidate to succeed Elizabeth Denham as information commissioner when she steps down... Read more »

Calling the cops for ransomware attacks doesn’t help, say cyber pros

Almost half (45%) of cyber security professionals believe that calling in law enforcement following a ransomware attack slows down the recovery process and distracts the victim’s IT and security... Read more »

UK loses £1.3bn to fraud and cyber crime so far this year

Individuals and organisations in the UK reported losses of £1.3bn to fraud and cyber crime between 1 January and 31 July 2021, a threefold increase on the year-ago figure... Read more »

13 million malware attacks on Linux seen in wild

Linux-based operating systems are being targeted more and more frequently by malicious actors, largely thanks to the prevalence of Linux in public cloud workloads. More than 13 million attempted... Read more »

Half of MS Exchange servers at risk in ProxyShell debacle

Up to and possibly more than 50% of Microsoft Exchange servers located in the UK appear to be vulnerable to three distinct vulnerabilities that were patched some time ago,... Read more »

The ransomware debate – to pay or not to pay?

With a global surge in ransomware attacks, governments have concentrated their attention on what drives these attacks’ popularity among cyber criminals. Most have concluded that it is their profitability.... Read more »

Over a million opt out of NHS data-sharing

A public backlash against NHS Digital’s General Practice Data for Planning and Research (GPDPR) data-sharing plan saw more than a million people exercise their right to opt out of... Read more »

Campaign groups claim police have bypassed Parliament with plans for live facial-recognition tech

Civil society groups have called for a ban on the use of life facial-recognition (LFR) technology amid claims that the government and the police are introducing intrusive surveillance measures... Read more »

Considerations when deciding on a new SIEM or SOAR tool

Looking at log files generated by IT infrastructure software is one of the less exciting parts of an IT administrator’s job, but those log files determine the health of... Read more »

ILOVEYOU virus

What is the ILOVEYOU virus? The ILOVEYOU virus comes in an email with “ILOVEYOU” in the subject line and contains an attachment that, when opened, results in the message... Read more »
Subscribe to our Newsletter