

The Cloud Atlas advanced persistent threat (APT) group has updated its weapons portfolio with polymorphic components that produce unique code for each infection. Cloud Atlas, also known as inception, was first discovered by researchers in 2014 following attacks in Russia and Kazakhstan. At the time, the APT utilized CVE-2012-0158, an old vulnerability in Microsoft Office [...]
Continue readingDemand for skilled IT professionals continues to rise, as do the number of technology-enabled requirements from internal users and external customers. So how can CIOs create a productive workforce? Five digital leaders give us their best-practice tips. 1. Treat your people well and make them feel important Gary Foote, CIO at the racing team Rich [...]
Continue reading12,000 workstations on average will be damaged in cases of destructive malware. Cyberattacks designed to cause damage have doubled in the past six months and 50 percent of organizations affected are in the manufacturing sector, researchers say. On Monday, IBM’s X-Force IRIS incident response team published new research based on recent cyberattacks they have been [...]
Continue readingCyberattacks and data breaches have cost UK mid-market companies over £30 billion, yet organisations remain complacent about their cybersecurity capabilities – putting them at greater risk from hackers and cybercrime. Business and financial adviser Grant Thornton surveyed hundreds of mid-market organisations – those with £15m and £1bn per year – and found that despite the [...]
Continue readingMalware which started life as a dropper is becoming more and more sophisticated. An Android banking trojan has returned with improvements which allow it to record the screens of infected devices while also adding new techniques that help the malware remain hidden from victims. First detailed by cybersecurity researchers at ThreatFabric in October last year, [...]
Continue readingE. coli is bad when it contaminates your food, but it can actually be good for robots. Scientists say synthetic bacteria could eventually repair a robot, generate energy, or detect chemicals in the environment. E. Coli gets a bad rap, but scientists are using the notorious bacteria as a sensor. A team of researchers at [...]
Continue readingDemand for technology contractors continues to grow with day rates, increasing by an average of 2.8% in the past year, up from 1.8% the year before. According to the survey by recruitment firm Hays, developer roles have seen pay grow across almost all UK regions. For Java developers, demand is often outstripping supply, it said, [...]
Continue readingThe Internet of Things is one of the most rapidly expanding industries. IoT technology is developing fascinating collaborations with other highly developed fields like blockchain or artificial intelligence while responding to, ‘What is an IOT platform?’ As per the anticipation of Gartner by 2020, about 95% of the products will make use of Internet of [...]
Continue readingAdobe’s monthly patch update is now available and fixes a handful of vulnerabilities in Flash, ColdFusion, and Campaign Classic. The June round of fixes released by the tech giant focuses on patching problems which could lead to arbitrary code execution in the software. In Adobe Flash, a single vulnerability has been resolved for software versions [...]
Continue readingApple didn’t spend any time during the WWDC keynote detailing an important feature that’s coming to the iPad when iPadOS 13 is released this fall: mouse support. More specifically, USB mouse support. There had been rumors leading up to WWDC that the iPad would gain support for a tool that is a staple of any [...]
Continue reading