Life Apple patches iOS security flaws found in spyware targeting activist Cupertino rushes out fix for iOS 9.3.5 26 Aug
Life Ashley Madison data breach due to poor security measures Reports slam inadequate data protection measures 24 Aug
Pro Despite billions spent on cybersecurity, companies still aren’t truly safe Companies on a treadmill to stay ahead of data thieves 23 Aug
Pro Poorly configured DNSSEC servers at root of DDoS attacks Admins need to ensure DNSSEC domains are properly set up, which can be easier said than done 23 Aug
Pro How to get your network and security teams working together Time to get both teams on the same page to avoid miscommunication around security threats 22 Aug
Life Alleged NSA data dump contains rare hacking tools Cisco says sample files reveal an undetected software flaw in its products 18 Aug
Pro Laptops most often stolen from most unlikely place Rise of mobile has led many CIOs to fret about data loss from lost or stolen devices, but a new study suggests IT theft in the office should be a... 17 Aug
Pro Cisco uncovers security threat in industrial control system SNMP exploit could let an attacker take complete control of Rockwell Automation’s MicroLogix system 16 Aug
Pro Consulting and outsourcing key as tech security spend soars Preventative security will continue to show strong growth, says Gartner 16 Aug
Life Guccifer 2.0 takes credit for hacking another Democratic committee Self-proclaimed DNC hacker promises journalists 'exclusive materials' 15 Aug
Trade Depaul chooses Emit for managed security service Charity's IT overhaul extends to 20 sites nationwide 12 Aug
Blogs Calculating the costs of cybercrime While always a thorny issue, cybercrime throws up yet another headache when it comes to counting the cost 12 Aug
Pro Flip Feng Shui cloud VM attack exploits hardware weaknesses Sneaky attack on neighbouring cloud VMs can be executed via the infamous Rowhammer memory-altering vulnerability, say security researchers 11 Aug
Blogs This one goes out to the insecure Managed or as-a-service, there's plenty of room for growth in the security market 10 Aug
Life Australians in the dark over census DoS attack Outage definite caused by overseas agents but exact origin still unknown 10 Aug
Pro Electronic safes hacked through power and timing analysis Researcher demonstrates variations in voltage and execution times can expose access codes 9 Aug
Pro Hackers hit Oracle’s Micros payment systems division Russian cybercrime syndicate suspected 9 Aug
Pro Supercomputers give a glimpse of cybersecurity’s automated future Seven supercomputers compete to find software vulnerabilities 8 Aug
Life Bitfinex asks users to share losses of bitcoin theft Digital currency exchange is bringing the website back online in phases 8 Aug
Pro Garda systems hit by ‘zero day’ attack Some systems taken offline in response to cyberattack 8 Aug
Pro Agency needed to focus on fixing the Internet’s problems Security researcher Dan Kaminsky calls for an agency that would be independent of intelligence agencies 5 Aug
Life Iranian hacker group knows who is on Telegram Encrypted messaging app leaked 15 million Iranian users’ phone numbers 4 Aug
Life Seven things you need to know about Samsung’s Galaxy Note7 Smartphone has a 64-bit processor, better PC integration 3 Aug
Pro Connected medical device makers must improve security Calls for tighter manufacturer security controls in medical IoT 3 Aug
Life 200m Yahoo accounts go up for sale on digital black market Hacker says database came from Russian group behind LinkedIn and MySpace breaches 2 Aug
Pro Spies planted critical infrastructure malware, says Russia’s FSB Military systems among critical infrastructure targeted 2 Aug
Pro Android’s Linux kernel defences strengthened New security changes in Android Nougat protect the kernel's memory and reduce its attack surface 29 Jul
Pro StackPath offers security as a service for enterprise cloud Start-up aims to bring enterprise-grade security tools to the cloud 28 Jul
Pro Many popular wireless keyboards are completely unprotected Popular models vulnerable to eavesdropping 28 Jul
Pro Businesses creating security nightmare by failing to secure privileged accounts Benchmark survey finds that more than half of organisations may be giving attackers access to their entire networks 26 Jul
Pro FBI probes DNC hack as suspicions of Russian involvement widen Russia's involvement would be a 'watershed moment' in cyberespionage, says security expert 26 Jul
Life New Locky ransomware can operate in offline mode Program will start encrypting files even if it can't connect to a command-and-control server 21 Jul
Pro Companies failing to plan for many cyber dangers Only 22% of companies have a comprehensive plan in place to deal with major security incidents 21 Jul
Pro Security software that uses ‘code hooking’ opens doors to hackers Flaws allow hackers to easily bypass exploit mitigations in the OS and third-party apps 20 Jul
Trade IBM grows cloud and analytics, but revenue slides overall Acquisitions are beginning to pay off 20 Jul
Pro Proper planning can mitigate ransomware fallout and strengthen security stance, says Goulding of Integrity 360 Incidence of ransomware attacks rising sharply 19 Jul
Life Android Trojan blocks victim from alerting banks Symantec has noticed a “call-barring” function in a newer version of Android malware 19 Jul
Pro Wearables could compromise corporate data Smart watches could lead to loss of sensitive data from the workplace 18 Jul
Subscribers 0
Fans 0
Followers 0
Followers