Apple Watch, iPhone Can Remotely Assess Frailty In Cardiovascular Patients (Yahoo! Finance: Company News)

Apple Inc (NASDAQ: AAPL)-made smartwatch and the iPhone could be used to remotely assess the frailty of patients with cardiovascular disease, according to a study published in PloS One.... Read more »

New iPads expected at Apples next event (CBSNews.com: Sci-Tech)

Apple sent out invitations for its next event, where the company is expected to unveil new versions of the iPad. Shara Tibken, a senior writer at CNET.com, says that... Read more »

‘Major’ security flaw detected in 5G core network slicing design

Network slicing will be one of the key drivers of 5G, offering the ability to construct private wireless networks, and is predicted to generate revenues of more than $20bn... Read more »

Cyber security complacency puts UK at risk, says NCSC head

The UK has made good progress on overall cyber security, but a sense of complacency risks upsetting the apple cart and too many people are still not taking cyber... Read more »

Warning: AWS IAM behaves differently to directory services

Researchers from Israeli security firm Lightspin have identified an issue with configuring identity and access control services on Amazon Web Services (AWS) that could leave many organisations vulnerable to... Read more »

Four in five UK businesses seek new security suppliers

About 80% of UK businesses are currently seeking new suppliers in the cyber security technology space as investment in security remains healthy during the pandemic. And with the average... Read more »

How to fix the top 5 cybersecurity vulnerabilities

The threat landscape gets progressively worse by the day. Cross-site scripting, SQL injection, exploits of sensitive data, phishing and denial of service (DDoS) attacks are far too common. More... Read more »

Facebook disrupts Chinese espionage operation

Facebook’s in-house cyber security team has disrupted a China-backed advanced persistent threat (APT) group dubbed Earth Empusa or Evil Eye, which was targeting activists, journalists and dissidents connected to... Read more »

The 3-2-1 backup rule: Has cloud made it obsolete?

A fundamental of backup is 3-2-1 – often referred to as “the 3-2-1 rule”. But what is the 3-2-1 rule? Is it still of value to all organisations, especially... Read more »

More than £34.5m stolen in pandemic scams over past year

In a chilling reminder that the threat from cyber criminals persists at any time and that no institution is safe, even those charged with saving life during the pandemic,... Read more »
Subscribe to our Newsletter