Malicious apps still getting past Google controls

Malicious mobile applications continue to pop up on the Google Play store with alarming regularity in spite of Google’s recently formed App Defence Alliance, according to researchers at Check Point, who have identified multiple apps…

The greatest contest ever – privacy versus security

No organisation today can avoid the technical, legal and ethical challenges of the privacy versus security debate. In the blue corner, we have privacy – a true contender for the people’s champion. It has held…

Scotland to set up payments service for public…

The Scottish government is planning a new payments service with potential for use across the the public sector. In a public information notice for the project, the government said the platform will be “user-centred, organisationally…

Kubernetes storage 101: Container storage basics

Use of containerised applications, usually with a container orchestrator such as Kubernetes, is currently a huge trend in IT, and is becoming almost ubiquitous with users across all sectors. Containerised applications is a form of…

F-Secure’s AI reads mean tweets to fight abuse…

Researchers at F-Secure’s Artificial Intelligence Centre of Excellence and the University of Crete’s Forth-IS Institute have developed a novel method for categorising tweets that they hope will, in future, help platforms such as Twitter clamp…

Exploring the Nordics’ healthy advantage in leisure tech

There is a fine line between sport and leisure, but their cultures are often poles apart. With the former entrenched in notions of competition, performance and tradition, the latter is often more flexible, holistic and…

Addressing the IoT security challenge

Businesses are subject to a number of critical market forces that are changing how they need to execute their cyber programmes. One of the biggest is that internet of things (IoT) technologies are significantly expanding…

UK and US accuse Russian spooks of Georgia…

The UK and US governments has pinned a series of large-scale and highly disruptive cyber attacks against targets in Georgia – including web hosting providers, government bodies, courts, non-governmental organisations (NGOs), media organisations and private…