cybersecurity

Thieves found a crazy new way to steal your AT&T iPhone 16

Having my iPhone stolen is a nightmare scenario, but I’m prepared for it already. I’m not as worried about the device going missing as I am about protecting and recovering my data. The iPhone is the most important computer in my life, after all. Thankfully, Apple makes it easy to back up all my data,…

Thieves found a crazy new way to steal your AT&T iPhone 16 Read More »

IAM best practices for cloud environments to combat cyber attacks

Organisations are constantly looking to identify different use cases to integrate AI into their business processes and accelerate the adoption of generative AI technologies. Companies are also finding ways to build innovative AI solutions to meet this demand. As a result, the usage of cloud infrastructure and, thereby, the global cloud computing footprint continues to…

IAM best practices for cloud environments to combat cyber attacks Read More »

Cyber companies need a best practice approach to major incidents.

Cyber security companies have made global headlines recently with a series of significant incidents which caused widespread disruption. The CrowdStrike incident is estimated to have cost Fortune 500 companies as much as $5.4bn, according to Parametrix analysis. The Okta data breach and Ivanti Virtual Private Network (VPN) vulnerabilities raise similar concerns about the impact cyber…

Cyber companies need a best practice approach to major incidents. Read More »

HSBC tests post-quantum VPN tunnel for digital ledgers

HSBC has worked with Quantinuum to trial “the first application” of quantum-secure technology for distributing tokenised physical gold. The HSBC Gold Token for retail investors in Hong Kong allows the bank’s customers to acquire fractional ownership of physical gold. Moving these tokens over financial networks requires encryption that cannot be broken by high-performance quantum computers…

HSBC tests post-quantum VPN tunnel for digital ledgers Read More »

Cyber firms need to centre their own resilience

Information security is essentially an information risk management discipline. By rendering many information systems inoperable, the global outage precipitated by Crowdstrike prevented several companies from accessing critical business information due to unplanned and extended downtime. The unavailability was not only to information systems, but also to related information processing. It was not only an information…

Cyber firms need to centre their own resilience Read More »

300,000 users of a top car rental company had their data stolen

In the latest of a neverending string of data breaches, the car rental company Avis has revealed that the data of nearly 300,000 users was stolen by hackers.As explained in a letter to affected customers, Avis discovered that an unauthorized third party had gained access to one of its business applications on August 5, 2024.…

300,000 users of a top car rental company had their data stolen Read More »

Intel Sells Its Arm Shares, Reduces Stakes in Other Companies

Intel has divested its entire stake in Arm Holdings during the second quarter, raising approximately $147 million. Alongside this, Intel sold its stake in cybersecurity firm ZeroFox and reduced its holdings in Astera Labs, all as part of a broader effort to manage costs and recover cash amid significant financial challenges. The sale of Intel’s…

Intel Sells Its Arm Shares, Reduces Stakes in Other Companies Read More »

Massive global Windows PC failure is crippling thousands of businesses

Update: CrowdStrike announced a workaround to take Windows machines from the recovery boot loop. The steps are at the end of the story.The Blue Screen of Death is impacting thousands of Windows machines today, as a faulty update from cybersecurity provider CrowdStrike is forcing those machines into a recovery boot loop, so they can’t start…

Massive global Windows PC failure is crippling thousands of businesses Read More »

How to ensure public cloud services are used safely and securely

By Published: 12 Jun 2024 The public cloud is a cloud computing model that enables resources such as applications, data storage, and virtual machines to be accessed remotely and on demand. While largely a benefit, it also leaves organisations open to public cloud security risks, particularly when they allow users to access on-demand services from…

How to ensure public cloud services are used safely and securely Read More »

Microsoft’s changes AI Recall feature after intense criticism

When Microsoft pulled back the curtain on Copilot Plus PCs in May, one announcement caught the eye of many cautious Windows users. One of the exclusive features coming to Copilot Plus PCs is called Recall, which uses artificial intelligence to take snapshots of the screen, store and analyze them locally, and then allow you to…

Microsoft’s changes AI Recall feature after intense criticism Read More »

Shopping Cart
Shopping cart0
There are no products in the cart!
Continue shopping
0
Scroll to Top