GR+Deals: Become a white hat security hacker for 92% off

What's a white hat?Well, hacking doesn't have to involve taking down corporations or leaking government secrets like a Bond villain.

Steam gamers warned of Windows 10 security risk

Steam gamers warned of Windows 10 security risk

(Image credit: Pixabay)

Valve's popular PC gaming platform Steam is vulnerable to a hugely damaging zero-day security vulnerability, experts have warned.According to new findings, around 72 million Windows users are at risk of having their systems taken over by an attacker who could then install malware, steal data, compromise passwords and more.

Exclusive: McAfee Acquires Startup NanoSec to Build Out Cloud Security Services for Containers

Cybersecurity firm McAfee is acquiring NanoSec, a cloud security startup focused on security solutions for applications built with the increasingly dominant ‘containers’ approach.“Customers have to have a security plan for their DevOps [software development and IT operation] and container strategies.

Microsoft Security Flaw Could Affect Azure, Says Check Point

Hyper-V is an important virtualization product for Microsoft that is used in Azure and Windows 10, according to Check Point.Although Check Point notified Microsoft about the original RDP bug, Microsoft decided the flaw wasn’t serious enough to create a software patch to fix the problem, Balmas said.

A Boeing Code Leak Exposes Security Flaws Deep in a 787's Guts

Now, nearly a year later, Santamarta claims that leaked code has led him to something unprecedented: security flaws in one of the 787 Dreamliner's components, deep in the plane's multi-tiered network.(A Boeing spokesperson says that the EFB can't be compromised from the CIS/MS, either, despite both being located in the same part of the 787's network.

Nvidia graphics cards found to be vulnerable to security flaw

Nvidia graphics cards found to be vulnerable to security flaw

(Image credit:

If you have an Nvidia graphics card in your system, whether its for work or for play, and you're running a Windows-based operating system, you're going to want to update your drivers, as driver 431.

UK gov launches send audit of cyber security labour market

The UK government has launched a second audit of the country's cyber security labour market in an effort to assess how companies across the country are handling the employment and training of IT professionals.The government will be hoping to see some measure of improvement over last year's audit, which found that of the roughly 1.

enterprise security: News, Reviews, Analysis and Insights

UK gov launches second audit of cyber security labour market


2 Aug, 2019
Dale Walker

Public and private sector firms will be probed on what security skills they currently lack

$125 Equifax compensation application now open


26 Jul, 2019
Connor Jones
Adam Shepherd

A further $500 is up for grabs under special circumstances

What is shadow IT?Tutorials

22 Feb, 2019
Keumars Afifi-Sabet
IT Pro

A guide to the CPU security flaws and their flawed patches

Microsoft flags IIS flaw that could lead to 100% CPU usage spikes when exploited


21 Feb, 2019
Keumars Afifi-Sabet

The DoS vulnerability involves sending malicious HTTP/2 connections that can slow down or freeze users' systems

Zero-day flaws in Internet Explorer and Exchange patched by Microsoft


13 Feb, 2019
Adam Shepherd

Exploit code is known to be in circulation for both vulnerabilities

US email provider wiped out by hacker


12 Feb, 2019
Adam Shepherd

Company has its entire infrastructure remotely formatted

Metro Bank targeted with 2FA-bypassing SS7 attacks


1 Feb, 2019
Keumars Afifi-Sabet

The highly sophisticated attack mechanism is becoming increasingly prevalent

Three key pillars of threat visibility


28 Jan, 2019
Esther Kezia Thorpe
Grace Halverson

For a company to see what threats they’re up against, they need visibility into all the data available

Four strategies organisations are using to combat cyber attacks


21 Jan, 2019
Esther Kezia Thorpe

AI, machine learning, technical integration and flexible tools are leading the way

Should employees be microchipped?

Top Windows Defender expert: These are the threats security hasn't yet solved

Using legitimate tools – a strategy called 'living off the land' – also makes it harder for antivirus to detect.And yesterday the Microsoft Defender ATP team talked up a feature it introduced last year, a 'hardware-rooted' virtualization-based security called 'runtime attestation'.

Mitch McConnell Received Donations from Voting Machine Lobbyists Before Blocking Election Security Bills

The plans would likely burden the two largest electronic voting machine vendors in the United States, Election Systems & Software and Dominion Voting Systems, with new regulations and financial burdens.Many of those lobbyists have contributed to the McConnell campaign, reported Sludge last month, an investigative outlet that focuses on money in politics.

Add an outdoor wireless security camera to your home for $48

This full-featured security camera is wireless, weatherproof and rechargeable.For a limited time, and while supplies last, the WiYA rechargeable wireless security camera with free cloud storage is $47.

How to build a mprehensive cyber security strategy

Therefore, it's important to have an effective cyber strategy, but it's not always easy to put something in place that provides comprehensive coverage.Ownership, mandate and scope
In order to build a functional and comprehensive cyber security strategy, you need to have a mandate at the most senior level of the organisation.

WhatsApp Security Flaw Could Let Hackers Alter Messages

Researchers at Symantec on Monday disclosed the security flaw, which undermines the notion that content in encrypted apps is impervious to manipulation, according to Yair Amit, chief technology officer of Modern OS Security at Symantec.A similar flaw was also found in Telegram, another encrypted messaging app, Symantec said on Monday.

7 security tips to keep people and apps from stealing your data

These apps that gathered precise geolocation data and phone identifiers without the owners' knowledge.We reached out to data privacy experts for their top tips to protect your personal data when using apps.

Microsoft stirs suspicions by adding telemetry files to security-only update

But some hawk-eyed observers noted a surprise in one of those Windows 7 packages.Under Microsoft's rules, what it calls "Security-only updates" are supposed to include, well, only security updates, not quality fixes or diagnostic tools.

Car security: how to keep your car and driveway protected

With car crime increasing, car security is more important than ever before.The modern car crook doesn’t use a crowbar or screwdriver, and isn’t stealing for fun.

The Biggest U.S. Voting Machine Manufacturer Is Worried About Election Security

As the 2020 elections keep looming on the horizon, concern over voting security is only growing.At least one industry doesn't have McConnell's confidence: voting machine manufacturers.

Three quarters of mobile apps have this security vulnerability that could put your personal data at risk

Three quarters of mobile applications have vulnerabilities relating to insecure data storage, leaving both Android and Apple iOS users open to cyberattacks that could allow hackers to steal sensitive information.The findings have been outlined in the Vulnerabilities and Threats in Mobile Applications 2019 report from Positive Technologies.

A guide to Windows 10’s security features

This will necessitate a switch to Windows 10, but this transition should also be seen as an opportunity to protect your organisation with a whole new suite of the latest security features.How Windows 10 can help
Microsoft has baked security into the foundation of Windows 10 and filled it with features that can efficiently and effectively protect your workforce and consequently, your business.

The benefits of Windows 10 migration beyond security

Moving on from Windows 7 to a modern platform could bring in all manner of benefits that go a long way beyond security.In particular, by combining a migration to Windows 10 with new hardware, you’re poised to transform your company’s IT.