Digital Infrastructure Minister Matt Warman today announced £500,000 in fresh government funding to help medical suppliers, primary care providers, and other businesses in the healthcare sector boost their cyber security. The fresh government funding comes in response to the National Cyber Security Centre's assessment that malicious...

Global gaming hardware manufacturing company Razer leaked the personal information of around 100,000 customers by storing their data in an Elasticsearch cluster that was misconfigured to enable public access, security researcher Bob Diachenko has revealed. The personal information of around 100,000 Razer customers was stored by...

Security researchers have discovered hundreds of vulnerabilities across major hotel and airline and travel booking websites, some of which have already suffered major breaches. UK-based consumer rights group Which? and tech consultancy 6point6 studied 98 travel sector companies, probing websites, subdomains, employee portals and other web...

New research from Kaspersky has discovered that of the 32% of Brits provided with a corporate desktop computer, only 77% have adequate anti-virus or cybersecurity software installed, leaving 23% of company desktops significantly insecure and exposed to cyber-threats. This is also the case for company smartphones,...

A leading UK university has warned staff and students that it will take weeks to recover from a recent ransomware incident, with a well-known threat group already posting stolen documents. Newcastle University in the north-east of England is part of the elite Russell Group. It claimed...

Millions of WordPress sites are being probed in automated attacks looking to exploit a recently discovered plugin vulnerability, according to security researchers. Wordfence, which itself produces a plugin for the platform, revealed news of the zero-day bug at the start of September. It affects File Manager which, as...

Before we start…what is a VPN? For the purposes of online security, a VPN provides a network with private, encrypted access to the internet using the internet connection of a remote server. All data that passes between devices on your network and this server is encrypted....

Ransomware refers to a type of malware designed to force victims into paying a fee in order to restore encrypted files or regain access to a disabled system. Ransomware is most commonly associated with file encryption. The hackers will infect a device, encrypt files and then...

Phishing scams…what are they? Phishing scams come in a variety of forms but typically they involve the use of a false identity to extract sensitive information from a victim. Phishing scammers use various methods to perform such scams, but the fraudulent practice is most strongly associated...

Luminate Education Group suffered a cyber attack last week that affected a number of Leeds-based colleges such as Leeds City College, Harrogate College, Keighley College, and University Centre Leeds. Earlier today, Luminate Education Group said the cyberattacks took place on 11th August and resulted in operational...