Pro IoT vendors warned to build in security Rush to sell devices shouldn’t override need to secure them and protect networks, experts warn 15 Sep
Pro Microsoft renews information-sharing partnership with NATO Agreement includes cybersecurity threat intelligence, source code access and more 14 Sep
Pro Cyberespionage group exploits satellite links for anonymity Russian Turla group hacks verticals to hide traffic 10 Sep
Life Microsoft pushes first round of Edge security updates Code overlap shows websites targeting Internet Explorer also a threat to Windows 10 browser 9 Sep
Life WhatsApp fixes dangerous flaw in Web app Malware could be delivered by changing a vCard's file extension 9 Sep
Pro DevOps shift requires new security approach New generation of security tools need to be built from the ground up for DevOps environment 9 Sep
Pro Malware is so last year for discerning hackers Fraudsters increasingly rely on legitimate admin tools instead of malware to successfully breach systems and steal data 8 Sep
Pro LinkedIn-based intel gathering campaign targets security industry Suspect activity prompts fears of imminent hack 7 Sep
Pro No reason to panic over GPU malware Though harder to detect, graphic processing unit malware is not invisible, says McAfee 4 Sep
Pro HP’s new tools root out malware, app vulnerabilites Enterprise security suite gets new capabilities 3 Sep
Pro VMware pitches network virtualisation for better security Missing piece of the puzzle that can provide a common base, argues vendor 3 Sep
Pro Algorithmic trick to banish password amnesia Turing Award winner proposes memory system to overcome password forgetfulness 2 Sep
Life US readies sanctions against China for cyber spying Experts question whether the penalties on Chinese companies for economic cyber espionage will have a significant effect 1 Sep
Pro Linux Foundation develops checklist for hardening workstations Group publishes a new list of recommendations, ranging from moderate to paranoid 1 Sep
Pro Researchers uncover more Regin spy tool modules Symantec researchers find 49 new modules for supposed NSA cyberespionage malware 1 Sep
Pro Majority of corporate risk stems from just 1% of employees A small proportion is responsible for three quarters of cloud-related enterprise security risk 27 Aug
Pro ‘Sometimes I’m terrified’ by the IoT, admits Cerf Strong but finely tuned authentication will be essential to the Internet of things, according to the 'father of the Internet' 26 Aug
Life ALM counts human cost of Ashley Madison hack Internal documents reveal security concerns were ignored 25 Aug
Pro Tips for protecting your business against cyber-extortion The rising incidence of cyber-extortion is being driven in part by encryption malware 25 Aug
Pro Virtualisation doubles the cost of security breach When a security incident involves VMs, recovery costs double compared to the traditional environment 25 Aug
Life Latest Ashley Madison data dump may not genuine Curious PC owners at risk of downloading malware from dud torrents 24 Aug
Life Hackers release full data dump from Ashley Madison Affairs website user data out in the open, many will have explaining to do 19 Aug
Life Darkode vendor of Facebook malware pleads guilty to one charge Eric L. Crocker and others created a botnet by infecting computers through social network 18 Aug
Pro Google Admin app zero day allows malicious apps to read files Android Admin app vulnerability can allow Google for Work account credentials to be stolen 18 Aug
Trade Kaspersky denies faking anti-virus info to thwart rivals Reuters article quoted anonymous sources saying Kaspersky tagged benign files as dangerous, possibly harming users 17 Aug
Life Italian teen finds two zero-day vulnerabilities in OS X Exploit yields root access to computers 17 Aug
Trade Re:Sure completes €250k funding round Ten jobs to be created at security solutions provider as UK expansion beckons 13 Aug
Pro Docker Content Trust steps up container security Standard security framework for Docker images being developed via open source key-sharing 12 Aug
Pro Asprox botnet, a long-running nuisance, disappears Operators may be regrouping to evade detection, according to Palo Alto Networks 11 Aug
Life Carphone Warehouse hack exposes 2.4m UK customers Irish customers unaffected after security breach discovered last week 10 Aug
Blogs Worst idea, ever! Offensive cyberwarfare capabilities for private companies is right up there with motorbike ashtrays 7 Aug
Life Tesla patches Model S after researcher software hack Demonstration allowed engine to be turned off while driving 7 Aug
Pro Dell opens up on ‘Emissary Panda’ hacking group SecureWorks has tracked another apparently Chinese espionage group. For organisations, it's a familiar story 6 Aug
Pro Data sharing paramount after a security incident US attorney advises organisations on what to do post breach, with emphasis on information, not attribution 5 Aug
Pro Ransomware not all it’s cracked up to be Readily detectable and in some cases can be forced to cough up frozen data without paying up, says researcher 5 Aug
Pro Three delivers mobile data security and optimisation Businesses to get improved security and control with CWSI, Wandera partnership 4 Aug
Life Yahoo tackles large malvertising campaign in ad network Ads with malicious code may have appeared across Yahoo's sites 4 Aug
Pro Companies should have offensive cyber-capabilities US counterterrorism expert advocates companies going on the offensive 4 Aug
Pro Cisco’s SDN controller has a security hole Company issues software to plug a root user access vulnerability 4 Aug
Subscribers 0
Fans 0
Followers 0
Followers