The road to Java 9: Modular Java finally gets OK’d

Modularity, a key but highly controversial feature of the upcoming Java 9 release, looks to be back on track with the Java community’s adoption of a

Read more

JSON Libraries Patched Against Invalid Curve Crypto Attack

A number of JSON libraries using the JSON Web Encryption specification (JWE) to create, sign and encrypt access tokens have been patched against an attack

Read more

5 Questions to Determine If You’ve Outgrown Your Web Hosting

Web hosting can seem like a commodity these days. You just choose the amount of disk space and bandwidth you need, and you’re up and

Read more

The Russian APT group Fancy Bear used a malware implant on Android devices to track and target Ukrainian artillery units from late 2014 through 2016

The popular hacking group, known as Fancy Bear, APT 28, Pawn Storm, Sednit or Sofacy, is once again in the headlines. Experts from the cyber security firm CrowdStrike reported the alleged

Read more

iPhone Security Bypass Spills Your Photos And Contacts

You’ve got a ton of very personal information on your phone. Text messages. Emails. Browsing history. Photos. The last thing you want is someone getting

Read more

The 5 Aspects of Amazing Web Design

At last count, there were over 767 million active websites, according to Netcraft. How does one lonely brand or company website make a dent amid

Read more

Ransomware stops here – preventing network-wide ransom attacks

Kasey Cross explains the devastation an organisation undergoes when struck by ransomware and describes preventative measures that can be taken to avoid spread from a

Read more