Petya and NotPetya: The basics

NotPetya superficially resembles the Petya ransomware in several ways, but there are a number of important ways in which it's different, and much more dangerous.

Oct 17 | Read more

KRACK: Researcher discovers flaws in WPA2 authentication

A researcher has released details on vulnerabilities in the Wi-Fi Protected Access II (WPA2) protocol, which he calls KRACK. Attacks taking advantage of the issues will work against all modern protected Wi-Fi networks. To put it another way, if a given device supports Wi-Fi it is likely impacted by the KRACK vulnerabilities.

Oct 16 | Read more

As rapid-fire builds threaten app quality, bespoke protection helps developers be both Agile and secure

Adoption of iterative Agile software-development methodologies may be allowing fast-moving, cloud-based companies to update their software on a daily basis – but one security specialist warns that speed can make those companies sitting ducks for security compromise if they don’t support their rapid development cycles with equally iterative testing and protection mechanisms.

Oct 16 | Read more

More News

Solution Centres


View all events Submit your own security event

Latest Videos

More videos

Blog Posts

Media Release

More media release