It's been a busy week filled with tech news, but have you been paying attention?

It's been a busy week filled with tech news, but have you been paying attention?
"Brutal Kangaroo” tool used by US spooks to hack into computers not connected to the Internet
Put your tech knowledge to the test!
Emails and passwords belonging to British MPs and high level public servants traded online
A browser hijacking operation initially reported to have 250 million victims by security firm Check Point isn't quite that large, according to Microsoft
INTERVIEW: Mark James, IT cyber security specialist at ESET, discusses cyber threat trends with Silicon at Infosecurity 2017
Researchers at Proofpoint say the malvertising in question has popped up around the world on several high-profile websites
CyberArk Labs finds GhostHook attack can bypass Microsoft's protection of Windows 10 kernel
The spread of WannaCry appears to not be slowing down anytime soon
Redmond did temporarily switch off third party anti-virus products for Windows 10, the firm admits
Consumers now more aware of ransomware and place onus on businesses to protect their personal data
Microsoft remains tight-lipped on the cause of the Skype outage over the past two days
Another example of the importance of keeping your computer systems up to date
Linux, BSD and Solaris are all affected by memory management bugs that could allow attackers to execute malicious code
It should come as no surprise, but cyber threats are continuing to rise
The two companies demonstrated a prototype that could help provide officially recognised identification for 7 million refugees worldwide
A contractor for the Republican Party has accidentally exposed personal data on more than 198 million citizens
Banks under the rule of the European Central Bank (ECB) set to face breach notification rules similar to GDPR
A European Parliament committee has called for end-to-end encryption to be enforced on all forms of digital communication
Cloud security still has the greatest mismatch between demand and supply
Google is to add more engineering resources and human experts in its efforts to remove extremist content from YouTube
State-sponsored cyber attacks have become more prominent than ever, with espionage and the influence of internal affairs leading the way
An unusually authentic-looking phishing scam attempts to obtain a photo of the target in order to launder stolen funds
Students dismayed after personal information is sent to over 300 colleagues
CherryBlossom can monitor Internet traffic and inject malicious code into targeted routers
Put your tech news knowledge to the test!
Consumer watchdog Which? has created a map highlighting cyber scam hotspots
Amid growing political pressure from European leaders, Facebook insists it is combating terrorism
Seventeen years later and US federal agencies can stop filing paperwork on the Millennium Bug
Investigations by Britain's NCSC back up previous claims regarding WannaCry origin