Month in security with Tony Anscombe – November 2024 edition Security Zero days under attack, a new advisory from ‘Five Eyes’,… rooter February 17, 2025 1 min read 0
Philip Torr: AI to the people | Starmus highlights Security We’re on the cusp of a technological revolution that is… rooter February 17, 2025 1 min read 0
Are pre-owned smartphones safe? How to choose a second-hand phone and avoid security risks Security Buying a pre-owned phone doesn’t have to mean compromising your… rooter February 17, 2025 1 min read 0
How cyber-secure is your business? | Unlocked 403 cybersecurity podcast (ep. 8) Security As cybersecurity is a make-or-break proposition for businesses of all… rooter February 17, 2025 1 min read 0
ESET Threat Report H2 2024 Security A view of the H2 2024 threat landscape as seen… rooter February 17, 2025 1 min read 0
Black Hat Europe 2024: Can AI systems be socially engineered? Security Could attackers use seemingly innocuous prompts to manipulate an AI… rooter February 17, 2025 1 min read 0
Black Hat Europe 2024: Why a CVSS score of 7.5 may be a ‘perfect’ 10 in your organization Security Aggregate vulnerability scores don’t tell the whole story – the… rooter February 17, 2025 1 min read 0
My information was stolen. Now what? Security The slow and painful recovery process rooter February 17, 2025 1 min read 0
Black Hat Europe 2024: Hacking a car – or rather, its infotainment system Security Our ‘computers on wheels’ are more connected than ever, but… rooter February 17, 2025 1 min read 0
Kathryn Thornton: Correcting Hubble’s vision | Starmus highlights Security The veteran of four space missions discusses challenges faced by… rooter February 17, 2025 1 min read 0