Latest
With just $700 and a Raspberry Pi — you too can become a cybercriminal
By Luke Hughes published
GEOBOX, an operating system turning Raspberry Pis into simple anonymous cyberattack tools, is being sold on Telegram.
ScaleFlux says that affordable 256TB "effective through compression" SSDs could arrive by 2025
By Wayne Williams published
ScaleFlux says that affordable 256TB "effective through compression" SSDs could arrive by 2025.
Ray framework flaw exploited for hackers to breach servers
By Sead Fadilpašić published
When is a remote code execution considered a flaw? And when a feature?
Watch out — that free Android VPN app could hijack your device
By Sead Fadilpašić published
Researchers find more than two dozen malicious Android VPN apps, turning the devices into residential proxies.
Thousands of Asus routers taken over by malware to form new proxy service
By Sead Fadilpašić published
Outdated Asus routers are being assimilated into a malicious botnet used by hackers to hide their traces
How offshore software development partners are leveraging AI tools
By Andy Hilliard published
With the continued rise of AI, many industries are being shaken up—the software development industry is no exception.
Cisco Webex can now tell if a contact center employee is burnt out
By Craig Hale published
Burnout detection, powered by artificial intelligence, is coming to Cisco Webex.
German government warns thousands of Microsoft Server instances are at risk online
By Sead Fadilpašić published
Many organizations are using outdated Microsoft Server versions vulnerable to remote code execution.
Are you a pro? Subscribe to our newsletter
Sign up to the TechRadar Pro newsletter to get all the top news, opinion, features and guidance your business needs to succeed!