Pro Denied! Why it’s time to address the real risk of DDoS attacks Denial of service mitigation is everyone's responsibility 14 Sep
Pro Data is the currency of the cyber world Cyber Threat Summit hears that the bad guys are becoming data brokers 13 Sep
Pro Ransomware prevalent in cloud-based malware Cloud-based filesharing, collaboration and social networking apps delivering ransomware 12 Sep
Pro FairWare ransomware targets exposed Redis instances Attackers exploit Redis DB configurations to add an unauthorised SSH key for the root account 2 Sep
Pro New ransomware threat deletes files from Linux Web servers Attackers claim the files are first encrypted and uploaded to a server under their control 31 Aug
Pro Despite billions spent on cybersecurity, companies still aren’t truly safe Companies on a treadmill to stay ahead of data thieves 23 Aug
Pro Poorly configured DNSSEC servers at root of DDoS attacks Admins need to ensure DNSSEC domains are properly set up, which can be easier said than done 23 Aug
Pro Laptops most often stolen from most unlikely place Rise of mobile has led many CIOs to fret about data loss from lost or stolen devices, but a new study suggests IT theft in the office should be a... 17 Aug
Blogs Calculating the costs of cybercrime While always a thorny issue, cybercrime throws up yet another headache when it comes to counting the cost 12 Aug
Pro Hackers hit Oracle’s Micros payment systems division Russian cybercrime syndicate suspected 9 Aug
Pro Garda systems hit by ‘zero day’ attack Some systems taken offline in response to cyberattack 8 Aug
Pro Connected medical device makers must improve security Calls for tighter manufacturer security controls in medical IoT 3 Aug
Pro Many popular wireless keyboards are completely unprotected Popular models vulnerable to eavesdropping 28 Jul
Life New Locky ransomware can operate in offline mode Program will start encrypting files even if it can't connect to a command-and-control server 21 Jul
Pro Stealthy cyberespionage malware targets energy companies Threat uses sophisticated techniques to evade detection and prepares the ground for more malware components 14 Jul
Pro Hacked 3D printers could commit industrial sabotage Hackers could introduce defects into printed products, researchers are warning 13 Jul
Life New Satana ransomware encrypts user files and master boot record Researchers say there is currently no way to decrypt files for free 4 Jul
Pro More than 100 DDoS botnets built from Linux malware for embedded devices Default and hard-coded credentials have led to the compromise of IoT devices 4 Jul
Pro Attackers rely on legit IT tools to carry out plans Malware unnecessary when attackers spoof regular users or admins 1 Jul
Life Mobile ransomware use jumps, blocking access to phones Kaspersky Lab has detected a spike among its own Android users 30 Jun
Life Flaws in Symantec products expose millions of computers to hacking High severity vulnerabilities in enterprise and consumer products could have allowed hackers to execute malicious code on computers with no user... 30 Jun
Pro Cerber ransomware targets enterprise via Office 365 Millions of Office 365 users were potentially at risk as ransomware targeting shifts from individuals to enterprises 29 Jun
Life New malware purports to be WhatsApp, Uber and Google Play Malicious app has spread through phishing campaigns over SMS 29 Jun
Life Bart ransomware proves effective without sophisticated encryption New malware locks user files in password-protected ZIP archives 28 Jun
Pro Sharp increase in corporate crypto-ransomware victims File-encrypting ransomware programs are on the rise and companies are increasingly their targets 24 Jun
Pro Think tanks mull Geneva Convention for cybercrime Panel of experts proposes to deal with the growing threat to critical infrastructure from possible cyberattack 23 Jun
Pro Hacker claims credit for DNC breach, posts files online CrowdStrike still thinks top Russian government hacking groups were involved 16 Jun
Pro Institute of Technology Carlow launches cybercrime and IT security degree New course to tackle infosec skills gap 13 Jun
Pro Fake white hats turn to bug poaching Attackers who demand payment for disclosing web application vulnerabilities don't have the organisation's best interests in mind 9 Jun
Pro Massive DDoS attacks reach record levels Nineteen attacks exceeding 100Gb/s recorded during the first three months of 2016 8 Jun
Pro 93% of phishing e-mails are now ransomware Number of phishing e-mails hit 6.3m in the first quarter of 2016 2 Jun
Pro Cybersecurity poses biggest risk to global financial system US Securities and Exchange Commission deems cybersecurity the biggest risk facing the global financial industry 27 May
Pro New ransomware ramps up for widespread attacks New version of DMA Locker fixes known flaws and adopts new exploit kit-based distribution model 25 May
Pro Criminal defendants demand to see FBI’s secret hacking tool Courts are facing a decision: expose the FBI's techniques or allow defendants to see the evidence against them 25 May
Pro IT pros think CEOs should be held responsible for data breaches Growing sentiment among UK IT decision makers that the top dog should take the blame 19 May
Pro Hacker hawking 167m LinkedIn user records Old hack data includes hashed passwords for millions of accounts that likely date back to 2012 18 May
Pro Cybercriminals increasingly embrace sophisticated business models Criminal hacking groups can employ HR specialists, marketers and training gurus, HPE says 18 May
Pro Security researchers crack new CryptXXX version Updated tools can help recover affected files 17 May
Pro Petya ransomware is now double the trouble The master boot record killer now can install a second file-encrypting program 16 May
Subscribers 0
Fans 0
Followers 0
Followers