![Network security is becoming a headache](/media/k2/items/cache/d20528350812c55d229e9fd1d95bdc73_Generic.jpg)
Network security is becoming a headache
New report from Juniper Networks
With all these remote connections, video streaming and budget constraints, network security is becoming a major headache for networking professionals, according to a study released by Juniper Networks.
![Alexa, can you send all your recordings to hackers?](/media/k2/items/cache/1f231efeeb0031c23f1b497da28abf10_Generic.jpg)
Alexa, can you send all your recordings to hackers?
Check Point makes charlies out of Amazon security
Israeli Security outfit Check Point have told Wired that Alexa's Web services had bugs that a hacker could have exploited to grab a target's entire voice history, meaning their recorded audio interactions with Alexa.
![Home workers finally understand the concept of security](/media/k2/items/cache/ac6a06f8ba9c29ecd7eb8c62e674d42e_Generic.jpg)
Home workers finally understand the concept of security
Three quarters of them finally know the company's cyber security policy
New research from Trend Micro shows that nearly three quarters of remote workers say they are more conscious of their organisation’s cybersecurity policies since the lockdown began.
![Consumers will flee poor security practices](/media/k2/items/cache/c47220f264f7e13d58f9a828025210b9_Generic.jpg)
Consumers will flee poor security practices
New research
New fresh from the oven research from PCI Pal has has uncovered that a significant proportion of consumers will act with their feet and take their custom elsewhere, should their personal data be compromised by a business due to poor security practices amid the pandemic.
![Babylon suffers security leak](/media/k2/items/cache/59be5ccf8a93116a4a056c4b466fb2a3_Generic.jpg)
Babylon suffers security leak
Persians invade again
Babylon Health has acknowledged that its GP video appointment app has suffered a data breach and gave users access to other patent's medical records.
![Severe security problem detected in all IoT devices](/media/k2/items/cache/c8ce258dd11cd9d9b886d9910e6d7dd8_Generic.jpg)
Severe security problem detected in all IoT devices
CallStranger needs patching
A severe vulnerability in a core protocol found in almost all internet of things (IoT) devices allows and attackers to hijack smart devices for DDoS attacks and bypass security to reach and conduct scans on a victim's internal network .
![Xiaomi stops its browsers phoning home](/media/k2/items/cache/407049f5e999f59a102bf3ac5e998852_Generic.jpg)
Xiaomi stops its browsers phoning home
You can switch off aggregated data collection now
Xiaomi released software updates for its browser apps on Monday amid fresh accusations it's been collecting private data from people who use its phones and browser apps.
![Apple's T2 security chip is killing off MacBook Pros early](/media/k2/items/cache/48026e6fba87165d18c81cd63509429e_Generic.jpg)
Apple's T2 security chip is killing off MacBook Pros early
You can't save them
As predicted, the proprietary locking system Apple rolled out with its 2018 MacBook Pros is hurting independent repair stores, refurbishers, and electronics recyclers.
![Linus is secure - it is its users who are not](/media/k2/items/cache/cce457a6db60bc8d12cf9b5c6db9bcd8_Generic.jpg)
Linus is secure - it is its users who are not
Most exploits are misconfigurations or poor administration
The rise in attacks on Linux in recent years is not due to its insecurity problems but more down to user error.
![Fake fingerprints take down security](/media/k2/items/cache/2fd136842c198b6883912021971f2225_Generic.jpg)
Fake fingerprints take down security
They can do it 80 percent of the time
If you are determined enough to make a fake fingerprint of a phone, you can unlock it 80 percent of the time, according to a new Talos security study.