First Technology

New Intel CPU Flaw Exploits Hyper-Threading to Steal Encrypted Data

A team of security researchers has discovered another serious side-channel vulnerability in Intel CPUs that could allow an attacker to sniff out sensitive protected data, like passwords and cryptographic keys, from other processes running in the same CPU core with ...

‘A cyber-attack could stop the country’

Superfast 5G mobile broadband could power smart cities and the internet of things, (IoT) but as more devices get connected, telecoms and security experts are warning that cyber-attacks could increase in number and severity. Our homes and cities are getting ...

Two New Bluetooth Chip Flaws Expose Millions of Devices to Remote Attacks

Security researchers have unveiled details of two critical vulnerabilities in Bluetooth Low Energy (BLE) chips embedded in millions of access points and networking devices used by enterprises around the world. Dubbed BleedingBit, the set of two vulnerabilities could allow remote attackers ...

The dynamic nature of trust in the digital age

Business thinker and author Rachel Botsman reveals how technology is impacting the way we trust, and the opportunities and consequences that presents. Trust: it seems a simple, universal concept. But try to define it and you quickly run into trouble. ...

Is your cloud provider lying to you? A guide for SMB’s.

Whatever industry you’re in, you tend to forget that what seems obvious to you is Greek to someone who isn’t in the same game.  In IT we’re probably guiltier than most, and even more so when it comes to ‘cloud ...

GreyEnergy: New malware campaign targets critical infrastructure companies

The hacking group which took down Ukrainian power grids is systematically targeting critical infrastructure in Ukraine and beyond in what security researchers believe could be cyber espionage and reconnaissance ahead of future attacks. Dubbed GreyEnergy by researchers at ESET, the group is ...

SMB security pack: Policies to protect your business

Small and midsize businesses are increasingly being targeted by cybercriminals—but they often lack the resources and expertise to develop comprehensive security policies to help defend against threats. This set of policies will help your company establish guidelines and procedures to ...