High-risk Google users – journalists, human rights and civil society activists, but also campaign staffers and people in abusive relationships – can now take advantage of Google’s Advanced Protection Program to keep their account safe from extremely targeted attacks. What is Advanced Protection? “Advanced Protection provides Google’s strongest security, designed for those who are at an elevated risk of attack and are willing to trade off a bit of convenience for more protection of their … More →
Europol is urging ISPs to stop using Carrier Grade Network Address Translation technologies, because they make identifying and tracking criminals a lot harder. What is Carrier Grade Network Address Translation? CGN (or CGNAT) allows up to several thousands Internet users to share the same IPv4 address. CGN was meant to be a temporary workaround for the problem arising from the slow transition from IPv4 to IPv6. But, according to Europol, for some operators it has … More →
Although businesses recognize the importance of digital transformation, organizations worldwide are struggling to balance the elements needed to deliver on digital. Of 1,625 business leaders surveyed a new Fujitsu report, one in three has cancelled a project in the last two years at a cost of €423,000, while 28% has experienced a failed project costing €555,000. 84 percent of businesses say that their customers expect them to be more digital, while 71 percent believe that … More →
Oracle has released its Critical Patch Update (CPU) for October 2017, addressing 252 vulnerabilities across the wide multitude of its products. Compared to the July 2017 CPU, this one addresses fewer security issues, but the number of yearly Oracle patches keeps rising: Delving into the October 2017 CPU This CPU contains 155 patches for vulnerabilities affecting a number of Oracle business applications: PeopleSoft, E-Business Suite, Fusion Middleware, Hospitality Applications, Retail, Hyperion, Siebel CRM, Supply Chain, … More →
Veracode announced findings from the 2017 State of Software Security Report, a comprehensive review of application security testing data from scans conducted by a base of more than 1,400 customers. Among other industry trends such as vulnerability fix rates and percent of applications with vulnerabilities, the report exposes the pervasive risk from vulnerable open source components. Researchers found that 88 percent of Java applications contain at least one vulnerable component, making them susceptible to widespread … More →
According to a survey conducted by Dimensional Research, 100 percent of respondents believe soft skills are important when hiring for their security teams. The three most important soft skills cited were analytical thinker (selected by 65 percent), good communicator (60 percent) and troubleshooter (59 percent). Tied for fourth place, “strong integrity and ethical behaviour” and “ability to work under pressure” were selected by 58 percent of participants. The need for soft skills has changed “The … More →
Unpatched web infrastructure and de-centralised web management practices are leaving UK organisations vulnerable to cyber-attacks and high profile data breaches. New RiskIQ research reveals a loss of control amongst the FT30, expanding their digital attack surface and opening doors to cyber criminals. Summary of risk findings across 99,467 live websites What’s leaving businesses exposed to cyber attack? New insight exposes five key areas leaving businesses exposed to cyber attack as a result of increasing digital … More →
And like that, there's another bit Star Wars videogame project that we should start worrying about.
It's called the Humble Down Under Bundle, and it contains a few gems.
That's it, the internet is on fire. Let it all burn down until Rocket League is the only surviving online game.
And this time you're not just fighting Skaven...
And there's a flavour for every gaming platform!
Netflix has previously said it wants 50% of its library to be original content in the next few years.
PC sales continue to lag behind, although sales may return to growth in 2018.
Microsoft will update people's devices in waves.
Why do I get the feeling that a game about a robot vacuum cleaner is going to give me some seriously epic feels?
Back in the game.
Keeping your PC private is more important than ever.
Every single implementation of Wi-Fi in existence is vulnerable to a new exploit unveiled by researchers.
105 services have been migrated from Symantec's on-premise infrastructure to Microsoft Azure