Pro Cyber-attackers targeting companies over consumers, says Hypponen While smart devices are becoming infected with malware 4 Nov
Longform Cryptojacking: detection, prevention, and recovery Ransomware-like tactics used to poison web sites to hijack computers for mining 4 Nov
Pro Cisco issues critical security warning for IOS XE REST API container The vulnerability could lead to attackers obtaining the token-id of an authenticated user 23 Oct
Pro Secured-core PCs offer new defence against firmware attacks Aimed primarily at business users 22 Oct
Pro How to prevent IPv6 VPN breakout Without properly configured remote-access VPNs, IPv6 traffic from remote devices can escape corporate security controls 16 Oct
Pro VMware builds security unit around Carbon Black tech VMware has wrapped up its $2.1bn buy of cloud-native endpoint security vendor 11 Oct
Pro Cobalt criminal group suspected of Magecart skimming attacks Researchers link Magecart-based skimming attacks to Cobalt (aka Carbanak), whose cyber attacks have netted millions of dollars 7 Oct
Pro Zero-day vulnerability gives attackers control of Android phones Most Android devices ‘pre-Fall 2018’ are affected 7 Oct
Pro Google launches leaked-password checker, will bake it into Chrome in December Service examines username-password combinations stored in Chrome's own password manager 4 Oct
Pro Eight ways your patch management policy is broken Mistakes get in the way of effective risk mitigation, here's how to fix them 3 Oct
Pro Google’s new Password Checkup tells you if your accounts can be compromised New service scans all the passwords you have saved in Chrome against lists of known leaks 3 Oct
Pro Social engineering explained: how criminals exploit human behaviour Train yourself to spot the signs 26 Sep
Pro Companies and security researchers are coordinating more closely than ever Experts agree cooordinated disclosure of vulnerabilities is a public good 24 Sep
Pro Mater Hospital reduces carbon footprint with Novi cloud solution Hospital's green project will reduce carbon footprint by 81,000 tonnes 23 Sep
Pro HP buys Bromium to apply virtualisation security to its PCs Bromium now applied within HPs Sure Click solution for certain laptops 23 Sep
Trade Security Risk Advisors to create 52 Kilkenny jobs Company establishes its European HQ and security operations centre 18 Sep
Pro AdaptiveMobile Security exposes massive network vulnerability Simjacker vulnerability exploited by surveillance companies for espionage operation 13 Sep
Pro Apple responds to Google security vulnerabilities report Report created false impression among users that their devices were compromised, says Apple 9 Sep
Pro Business email compromise overtakes ransomware as top cyber threat Almost a quarter of AIG’s cyber claims in 2018 were BEC related 9 Sep
Pro IoT security essentials: Physical, network, software Internet of Things devices present unique security problems 5 Sep
Blogs Breaking the silence on cyber crime For it to succeed, phishing extortion needs ignorance and silence 2 Sep
Pro VMware spends €4.3b to acquire Pivotal and Carbon Black Acquisition details and new cloud, security directions expected at VMworld show 23 Aug
Pro Cisco: 6 critical security alarms for UCS software and small-biz routers Problems have a severity rating of 9.8 out of 10 on the Common Vulnerability Scoring System 22 Aug
Pro Access control: a key component of data security Access controls authenticate and authorise individuals to access permitted information 21 Aug
Pro More critical Remote Desktop flaws expose Windows systems to hacking Multiple RDS and RDP vulnerabilities found and fixed, but research suggests many machines could remain exposed 15 Aug
Pro Popular building management system vulnerable to takeover Remotely exploitable vulnerability in internet-connected devices gives attackers a means to cause disruption and damage in a wide range of industries 14 Aug
Pro Avaya enterprise VoIP phones are vulnerable to hacking Attackers can use the vulnerability to gain complete control of the phone 9 Aug
Pro 350,000 Irish office workers use unsecure remote working devices One in 10 don’t take any measures to protect mobile devices used for work purposes 9 Aug
Pro Why security culture needs to change Embrace a culture where security is everyone's job and risks are shared, conference hears 9 Aug
Pro New Spectre-like CPU vulnerability bypasses existing defences SWAPGS vulnerability can allow attackers to access contents of kernel memory addresses 8 Aug
Pro Microsoft finds Russia-linked attacks exploiting IoT devices Default passwords, unpatched devices, poor inventory of IoT gear led to exploits by STRONTIUM 7 Aug
Pro Nine things a company should know about mobile security Mobile devices are now the 'big score' for hackers, says CWSI 31 Jul
Pro Fujitsu steps up biometric offerings with PalmSecure Biometric system extends from physical to machine access and beyond 30 Jul
Pro Critical VxWorks flaws expose millions of devices to hacking Many of the flaws allow attackers to take over devices remotely by just sending network packets 30 Jul
Pro Cloud complexity and rapid adoption reveal vulnerabilities and short cuts Report identifies misconfiguration as key issue with containers, and Ireland as a prime site 26 Jul
Pro UK report “yet another repudiation” of bans, says Huawei UK Science and Technology Committee finds “no evidence” excluding vendor from telecoms networks would “constitute a proportionate... 17 Jul
Pro Companies with zero-trust network security move toward biometric authentication Usage of biometric authentication on devices is increasing to verify access requests, according to new research 17 Jul
Pro Alphabet enfolds Chronicle security into Google Cloud 'Moonshot' spinout that was a standalone security company is folded into cloud platform, with new promise for customers 15 Jul
Subscribers 0
Fans 0
Followers 0
Followers