Cybersecurity
Cybersecurity
Troy Hunt: Weekly Update 456
It's time to fly! It's two months to the day since we came back from the last...
Hardware Releases
Steam beta gets native Apple Silicon support — the only public Arm version of Steam
Valve just released a Steam Client Beta that runs on Apple Silicon. The company announced on the Steam...
Industry Events & Conferences
Virtual Breakout Rooms: Different Types & How They Work
Let’s talk about virtual breakout rooms! Now that virtual and hybrid events are part of the new normal,...
Software Updates & Reviews
Publish Your App to Google Play Store
The number of Google Play moderation rejections has...
Marks & Spencer’s ransomware nightmare
Over Easter, retail giant Marks & Spencer (M&S) discovered that it had suffered a highly damaging ransomware attack that left some shop shelves empty,...
Vastaamo – Darknet Diaries
Full Transcript
Joe Tidy investigates what may be the cruelest and most disturbing cyber attack in history. A breach so invasive...
Don’t let dormant accounts become a doorway for cybercriminals
Do you have online accounts you haven't used in years? If so,...
Troy Hunt: Weekly Update 454
We're two weeks in from the launch of the new HIBP, and...
What cybercriminals do with their money (Part 4) – Sophos News
Content warning: Because of the nature of some of the activities we discovered, this series of articles contains content that some readers may find...
The Secret Defense Strategy of Four Critical Industries Combating Advanced Cyber Threats
The evolution of cyber threats has forced organizations across all industries to rethink their security strategies. As attackers become more sophisticated — leveraging encryption,...