Food Standards Agency picks Exponential-e to revitalise connectivity across 220 sites as it strives to improve operational efficiency and compliance processes
Advertising giant was one of many companies hit in June 2017 by malware distributed through Ukrainian accounting software
Amazon opens its latest delivery hub in Bahrain to serve customers in the Middle East
Microsoft announces completion of cross-platform SQL Server, GDPR compliance for Office 365, plus Azure Stack
Oracle released the long-awaited Java 9, along with Java EE 8 -- each with key improvements to simplify the development process using the language, including modularity in Java 9.
Muhammad Rabbani, international director of Cage, is convicted of an offence under the terrorism act after refusing to disclose his mobile phone PIN and laptop password under Terrorism Act
Speaking at the (ISC)2 Security Congress, FBI Deputy Assistant Director Don Freese spoke about need for security pros to replace fear and emotion with proper cyber-risk management.
Some Apple Mac users are at risk of password theft due to a zero-day vulnerability discovered in some versions of the operating system
Microsoft CEO Satya Nadella kicks off Microsoft Ignite with talk of future products, use cases for AI and continued bundling of Microsoft products.
IT decision-makers are no more confident about how Brexit will affect them despite this year’s general election and talks between the EU and the UK
A year after the first Mirai botnet attacks, the global botnet has grown, with many countries and cities unwittingly hosting large number of bot-infected devices
The DerbyCon keynote covered why security research is an approachable field, as well as how to bypass a Windows digital signature check to run unwanted code.
At the (ISC)2 Security Congress, infosec professionals warned of sophisticated ransomware attackers that are using more advanced techniques to encrypt entire networks.
The Malaysian lender hopes to improve the loan application experience and grow its personal loan business by 60% through a new chatbot
Vodafone’s fifth annual look at the IoT market reveals that the percentage of companies with more than 50,000 connected devices has effectively doubled in the past year
The global WannaCry and NotPetya attacks were both examples of pseudo-ransomware, according to McAfee researchers
Microsoft joins Géant's bid to create a cost-effective and accessible cloud procurement hub for Europe's education and research community
A security researcher describes the network lateral movement process from an attacker's perspective and a few key points of focus for IT pros, at DerbyCon.
Bytes has boosted its position in the North and the public sector with the move to acquire Phoenix Software
Google's Project Zero released a proof-of-concept iOS exploit similar to the Broadpwn Wi-Fi flaw that could allow an attacker to run code or implant a backdoor.
Cloud-based infrastructure is reshaping the networking industry -- an issue ONUG has seen within its user community and will address at its upcoming fall conference in New York City.
News roundup: During the Deloitte hack, attackers had access to client data and internal email servers. Plus, the U.S. asks China not to enforce its Cybersecurity Law, and more.
One expert is concerned about the large increase of government data requests received by Apple and the effects this surveillance activity has on user privacy.