IT Brief UK - Technology news for CIOs & IT decision-makers

Aria stories - Page 76

Aria is where cutting‑edge technology, security, and AI‑driven innovation intersect. The stories tagged here span everything from next‑gen cloud and data platforms to ransomware trends, smart infrastructure, and the fast‑evolving world of generative and agentic AI. If you want to understand how tools like AI copilots, LLMs, and real‑time analytics are reshaping everything from finance to healthcare to manufacturing, this is your starting point.

Dive into in‑depth coverage of cybersecurity – botnets, ransomware variants, mobile malware, zero‑day exploits, and the shift to continuous, intelligence‑led defence. Explore how data centres, networks, and observability platforms are being redesigned for AI workloads, sustainability, and hybrid cloud. Follow the rise of AI in everyday products too, from wearables and smart home devices to vehicles, retail experiences, and next‑gen collaboration tools.

Aria isn’t just about the technology itself, but about its impact: on regulation, trust, jobs, skills, and digital resilience. Here you’ll find expert commentary, major vendor announcements, case studies, and long‑form explainers that help you connect the dots between infrastructure, security, AI, and real business outcomes. If you’re responsible for strategy, architecture, risk, or innovation, the Aria tag will keep you ahead of what’s coming next.

Thinkstockphotos 599997332 ys0kqhq

How to be the cat - not the mouse - in the fight against zero-day malware

Tue, 11th Oct 2016
#
malware
#
ransomware
#
cybersecurity
Zero-day malware mutations can spell disaster for networks, as they can often get in completely undetected by traditional security protection.
Thinkstockphotos 605956402

Ransomware: Expert advice on how to keep safe and secure

Tue, 11th Oct 2016
#
malware
#
ransomware
#
cybersecurity
Paying criminals is never a good idea, even when it seems expedient. Ransomware authors are under no obligation to give you back what you pay.
Thinkstockphotos 465158558

Proofpoint uncovers new MarsJoke ransomware, then Kaspersky finds the fix

Wed, 5th Oct 2016
#
malware
#
ransomware
#
cybersecurity
British institutions are being targeted by a new ransomware strain called MarsJoke, with government and educational organizations being the main victims.
Thinkstockphotos 517128260 ehdih02

Symantec detects ransomware variants created directly on mobile devices

Tue, 4th Oct 2016
#
malware
#
ransomware
#
cybersecurity
New variants of Android.Lockscreen ransomware are using pseudorandom passcodes to prevent victims from unlocking devices, warns Symantec.
Thinkstockphotos 538646904 1

Planning crucial to minimising and recovering from ransomware

Mon, 3rd Oct 2016
#
malware
#
ransomware
#
cybersecurity
Ransomware attacks are becoming increasingly common, with payments increasing each day you wait. Planning ahead is crucial.
Thinkstockphotos 544342588

Connected homes and IoT driving residential security systems

Mon, 3rd Oct 2016
#
iot
#
cybersecurity
#
technavio
The residential security systems market is set to grow more than 7% during 2016-2020, with security cameras leading the way.
Thinkstockphotos 497753144

12 easy ways IT businesses can increase efficiency and cut costs

Mon, 3rd Oct 2016
#
opinion
#
debtor daddy
#
nato
IT firms can boost their bottom lines with our savvy guide: 12 simple steps to enhance efficiency and slash costs effortlessly.
Thinkstockphotos 530437166

Unit 42 discovers Komplex trojan targeting OS X systems

Tue, 27th Sep 2016
#
firewalls
#
network infrastructure
#
network security
The Sofacy Group is still coming up with new trojans, with Unit 42 researchers reporting that an OS X trojan called 'Komplex' is now on the scene.
Download

10 cybersecurity lessons learned from Season 2 of Mr. Robot

Mon, 26th Sep 2016
#
robots
#
cybersecurity
#
mr.robot
Cybersecurity and hacking are just plot devices the series uses to achieve its goals, but they play a major role in the series.
Thinkstockphotos 513120870

Carbon Black discovers new adware related threat

Mon, 26th Sep 2016
#
cybersecurity
#
carbon black
These obfuscation techniques easily evade sandboxing and other intrusion detection techniques due to Binary Fragmentation.
Unnamed

Expert insights: How to keep on top of the malware threat

Thu, 22nd Sep 2016
#
malware
#
ransomware
#
cybersecurity
If you really want to keep on top of the malware threat then you need to embrace Threat Intelligence in the broadest sense.
Thinkstockphotos 509230826

Employees download new malware every four seconds, says Check Point

Wed, 21st Sep 2016
#
cybersecurity
#
check point software
#
threat landscape
Check Point report: Employees unwittingly download new malware every four seconds, posing a stark threat to global cyber security.
Global security3

Sophos releases product to address global cybersecurity skills shortage

Tue, 20th Sep 2016
#
malware
#
firewalls
#
network infrastructure
Intercept X looks to provide a fast-track to advanced protection and response capabilities while minimising the need for specialised security admin.
Thinkstockphotos 578296274

Webroot tackles IoT explosion with CyberFlow Analytics acquisition

Tue, 20th Sep 2016
#
data analytics
#
martech
#
planning
Webroot strengthens cybersecurity leadership with acquisition of CyberFlow Analytics, enhancing ability to address complex threat landscape.
Thinkstockphotos 472104514 vkn5j5k

Trend Micro shows that Linux systems not so bulletproof against trojans

Thu, 15th Sep 2016
#
malware
#
ddos
#
ransomware
Trend Micro says it's not all smooth sailing for Linux users, as its open source based operating system is increasingly vulnerable to cyber attacks.
Thinkstockphotos 511068126

Symantec's August malware stats show rise in malware but drop in attacks

Tue, 13th Sep 2016
#
malware
#
cybersecurity
#
symantec
New malware variants are on the rise but phishing attack rates have dropped, suggesting a rollercoaster mix of threat types in August.
Thinkstockphotos 525318499

Check Point says beware of the Trident Exploits on iOS

Tue, 30th Aug 2016
#
malware
#
cybersecurity
#
apple
UAE activist targeted by 'Trident' - a trio of zero-day iOS exploits enabling total device control, discovered by Toronto researchers.
Thinkstockphotos 564600208

Spammers are exploiting the massive political Trump card in 2016

Wed, 24th Aug 2016
#
phishing
#
email security
#
elections
Spam levels, including fake news about Donald Trump, accounted for over half of all email traffic in Q2 2016, according to Kaspersky Labs.
Thinkstockphotos 511068346

Nemucod is back and serving an ad-clicking backdoor instead of ransomware

Mon, 15th Aug 2016
#
malware
#
cybersecurity
#
trojan
The trojan downloader Nemucod is back with a new campaign. This time, it has changed the payload served to its victims – it's not ransomware.
Thinkstockphotos 86496676

Palo Alto Networks raises the bar for endpoint security

Mon, 8th Aug 2016
#
firewalls
#
network infrastructure
#
endpoint protection
Palo Alto Networks adds machine learning to its security software, enhancing its malware and exploit prevention capabilities.