perm_phone_msgUNDER ATTACK? S.O.S. LINE 0114 354 0054

Top Categories



Cyber security The Register

Ukraine blames Belarus for PC-wiping ‘ransomware’ that has no recovery method and nukes target boxen

After last week’s website defacements, Ukraine is now being targeted by boot record-wiping malware that looks like ransomware but with one crucial difference: there’s no recovery method. Officials have pointed the finger at Belarus. Fountain at Independence Square in Minsk, Belarus Targets of this new malware wave “span multiple government, [...]

Top Voted
Sorry, there is nothing for the moment.

976 Results / Page 1 of 109




Cyber security TechRepublic

New study reveals phishing simulations might not be effective in training users

A new study at unprecedented scale revealed that embedded phishing training in simulations run by organizations doesn’t work well. Yet crowd-sourcing phishing detection is. Image: Shutterstock/CalypsoArt When it comes to compromising a company’s network, the easiest way to start is usually to target the employees with phishing campaigns. They are ...


  • 2

Cyber security TechRepublic

MalSmoke attack: Zloader malware exploits Microsoft’s signature verification to steal sensitive data

Already impacting more than 2,000 victims, the malware is able to modify a DLL file digitally signed by Microsoft, says Check Point Research. Image: danijelala, Getty Images/iStockPhoto A new malware campaign is taking advantage of a vulnerability in the way Microsoft digitally signs a specific file type. As described on ...



Cyber security TechRepublic

Check for Log4j vulnerabilities with this simple-to-use script

If you’re not certain whether your Java project is free from Log4j vulnerabilities, you should try this easy-to-use scanning tool immediately. Image: Shutterstock/LeoWolfert One great thing about Linux and the open source community is that as soon as a vulnerability is detected, developers are hard at work releasing tools to ...


  • 3

Cyber security TechRepublic

Synthetic identity fraud: What is it, and why is it harmful?

Online consumers can do everything right and still become cyber victims. Learn about synthetic identity fraud and why “buyer beware” is not enough. Image: Shutterstock/PabloLagart Digital criminals are creating new and effective ways to con businesses and financial institutions by using synthetic identity fraud. They are having enough success that ...


  • 5

Cyber security TechRepublic

How to install the ConfigServer and Security Firewall combo on Ubuntu Server

If you’d like a powerful firewall for your Ubuntu Server, but one that offers a fairly straightforward configuration, Jack Wallen thinks CSF might be the right tool for the job. Illustration: Lisa Hornung/TechRepublic Data center must-reads Although Uncomplicated Firewall is an outstanding security service on Ubuntu Server, there might be ...

Designed by Cloud Boffins