Pro Most organisations plan to seek external help after security breaches Incident response plan: phone for help, study finds 19 Mar
Pro Chinese government supports citizen hacking Security forum hears expert assert state sponsorship but lack of control 18 Mar
Life Twitter: Attack e-mails drop from 110 million per day to a few thousand DMARC protocol largely solves fake messages problem 14 Mar
Life Phishing campaign targets Google Docs, Drive users Fake login page could trap unsuspecting users 14 Mar
Life Microsoft Patch Tuesday rounds up IE flaws Penultimate round of patches for Windows XP released 12 Mar
Pro Target hackers showed intimate knowledge of firm’s network, suggests McAfee What might have stopped them? 11 Mar
Life NSA created ‘bazaar’ to spy on EU citizens, says Snowden Spy agencies allowed US to piece together data into a larger picture 7 Mar
Pro Companies sack IT staff after network outages Each incident costs the business over €100,000 7 Mar
Pro Target CIO resigns after data breach Retailer announces the resignation after data breaches affecting up to 110 million people 7 Mar
Pro Cisco execs address defective memory component issues with routers, switches Concerns raised over fix-on-fail downtime 6 Mar
Life Major security flaw threatens Linux users Developer scrambles to fix "embarrassing" privacy loophole 5 Mar
Life Yahoo to phase out Facebook, Google sign-in Mayer sets plans to create services ecosystem in place 5 Mar
Pro China’s Windows XP users will continue to get security support XP still reigns as the most popular PC OS in the nation 3 Mar
Pro Russia’s Stuxnet? Security firm spots suspicious ‘Uroburos’ rootkit Links to 2008 'Agent.btz' attack on US military 3 Mar
Pro Windows 7, XP vulnerabilities rose in 2013 Secunia analysed reported vulnerabilities in 50 most-used software products 28 Feb
Pro Check Point unveils security architecture for threat-intelligence sharing Software Defined Protection... 28 Feb
Pro Security researchers urge tech companies to explain cryptographic choices Open letter outlines 10 transparency principles for companies to regain user trust following surveillance revelations 28 Feb
Pro Dell combines apps and appliances for mobile security SonicWALL Mobile Connect 3.0 app and SonicWALL SRA 7.5 protect data and comms for enterprise 27 Feb
Life New iOS flaw allows malicious apps to record touch screen presses Captured touch screen data could be used to reconstruct what users typed 25 Feb
Life Malware-infected Android apps spike in the Google Play store Wallpaper Dragon Ball, Finger Hockey were cited among the most downloaded malicious apps 20 Feb
Blogs And the beat goes on… The GSOC affair rumbles on, but what seems more and more certain is that the ‘technical’ evidence is questionable at best 19 Feb
Life Valve rebuffs Steam browser spying allegations Managing director Newell swears his company doesn't care about users' browsing habits 19 Feb
Life Syrian Electronic Army strikes again as 1m Forbes accounts breached Weak password security exposed in another popular website 18 Feb
Life Merkel, Hollande planning ways to counteract NSA surveillance Chancellor says Europeans' e-mails should not cross the Atlantic 17 Feb
Life Kickstarter hacked, user names and encrypted passwords accessed User data was stolen, though credit card information remained intact, says website 17 Feb
Life IE10 under attack as hackers exploit zero-day bug Vulnerability spotted two days after Patch Tuesday update 14 Feb
Blogs Of wonder and incredulity The GSOC alleged bugging has raised questions around paranoia, credibility and incredulity 12 Feb
Life Bitcoin exchanges hit by DDoS attacks Bitstamp falls victim to online attacks that affect transaction receipts. 12 Feb
Life IT pros volunteer for Safe and Secure Online programme Primary school pupils learn about dangers of identity theft, weak passwords and more 11 Feb
Life Snapchat vulnerability can be exploited to crash iPhones, researcher says Request tokens can be resused to launch denial-of-service attacks against the app's users 11 Feb
Pro Garda Ombudsman offices bugged Phones and wireless networks compromised for spying, reports Sunday Times 10 Feb
Pro Research to develop self-destructing devices IBM wins $3m contract to self-destruct mobile devices 10 Feb
Pro 2014: Security outlook ALEX MEEHAN finds that while the profile of threats may not have changed much for this year, the way that organisations will need to deal with... 7 Feb
Pro SEPA draws a crowd, says Williams of Threatscape Forget about NSA, the letters to worry about are CIA: confidentiality, integrity and availability 7 Feb
Life Adobe releases critical emergency update for Flash Player Vulnerability spotted in the wild, the company said 5 Feb
Life Yahoo acknowledges Mail hack Undlsclosed number of passwords and usernames after third party database attacked 31 Jan
Pro Security start-up protects Web servers with ‘shape-shifting’ Silicon Valley elite back new security firm 21 Jan
Pro Irish companies suffer record number of data breaches Human element biggest threat to information security, says ICS 21 Jan
Subscribers 0
Fans 0
Followers 0
Followers