Cybersecurity News Blog

VMware Unveils Virtual Cloud Network

VMware Unveils Virtual Cloud Network

Last week at Dell Technologies World 2018, VMware Inc. announced what it is referring to, and hopes to be, the future of networking the Virtual Cloud Network. The Virtual Cloud Network takes VMware’s NSX...

Amazon Echo made to eavesdrop without exploit or manipulation

Amazon Echo made to eavesdrop without exploit or manipulation

Checkmarx security researchers developed a proof of concept attack that would allow enable an Amazon Echo to continue recording a user long after a request is made. The exploit doesn’t require any tweaks to Alexa’s...

Will Dell eat VMware? Or will Carl Icahn snack on Dell? And where does Uber fit in? Yes, Uber!

Will Dell eat VMware? Or will Carl Icahn snack on Dell? And where does Uber fit in? Yes, Uber!

The “what will Dell do to/with/for/about VMware” rumour mill has started spinning again. The force giving the mill the biggest push is a hint that activist investor Carl Icahn has acquired a chunk of...

Singtel, VMware to set up hybrid cloud sandbox

Singtel, VMware to set up hybrid cloud sandbox

Singtel and VMware are setting up a sandbox environment for enterprises to test their workloads in a hybrid cloud environment, underscoring the growing ties between Southeast Asia’s biggest telco and the virtualisation bigwig. Both...

Facebook halts medical data sharing plan

Facebook halts medical data sharing plan

Facebook has halted plans to collect patient data from hospitals and match it up with its users’ information. The social network confirmed the idea had been discussed but had been “paused” while the company...

Automation and gamification key to cyber security

Automation and gamification key to cyber security

The use of automation and gamification are key to winning the fight against cyber criminals in the face of the skills’ shortage, a study investigating challenges facing IT security teams reveals. Concerted efforts to...

Cybersecurity needs women

Cybersecurity needs women

Computer hacking is becoming more widespread and damaging. Headlines highlight attacks on government agencies, political campaign offices, financial institutions and big corporations. But citizens and consumers are paying a heavy price. In 2016, 2...

Why manufacturers must rise to the cyber-security challenge

Why manufacturers must rise to the cyber-security challenge

The defence secretary’s recent warnings of increased cyber-warfare from nation states and other actors, determined to threaten the UK’s infrastructure, must be a wake-up call to the engineering profession. As we rightly reap the...

Patch Tuesday: Microsoft patches Remote Desktop Protocol exploit

Patch Tuesday: Microsoft patches Remote Desktop Protocol exploit

This month’s Microsoft patch Tuesday included more than 70 patches 15 of which were marked as critical and one that could exploit authentication in Microsoft Remote Desktop Protocol. Microsoft released updates for products including,...

10 technologies that are changing how we think about cybersecurity

10 technologies that are changing how we think about cybersecurity

With technology having come to dictate our global economy, it’s important to consider how it’s going to develop in the coming years. That’s especially the case in cybersecurity, which protects us from the multitude...