Pro Russia will strike US elections again, FBI warns FBI, NSA working with European counterparts to stop suspected Russian hacking 21 Mar
Pro Four charged, including Russian agents, for Yahoo hack Hackers targeted Yahoo accounts of officials for intelligence and financial gain, says US government 16 Mar
Pro Mirai is the hydra of IoT security: too many heads to cut off Some botnets have been disbanded, but new uses continue to emerge 14 Mar
Pro Hacker cuts a swathe through the Dark Web A hacker connected with Anonymous attacked Freedom Hosting II, causing thousands of dark web sites to go down - as many as 85%, say... 13 Mar
Pro Post CIA leak, Intel Security releases EFI rootkit detection tool A new module for Intel Security's CHIPSEC framework can find rogue binaries inside the low-level firmware of computers 10 Mar
Pro Mining a SIEM can help detect and respond faster to security threats Interpreting security intelligence can be a problem for enterprise 9 Mar
Pro 7 considerations in choosing a Managed Service Provider There is more than just service capabilities to consider when evaluating MSSPs 9 Mar
Blogs Connected cars and the need to be forgotten IoT, in all its forms, must have security baked-in and by design 9 Mar
Pro Inside Track: The service option Going with a security service provider is about more than cost or cover, finds ALEX MEEHAN, confidence is also a major factor 9 Mar
Pro Application security risk PATRICK CAREY advocates a three-pronged approach to managing application security risk 9 Mar
Pro NSA and CIA may be behind Equation cyber group CIA documents leaked by WikiLeaks suggests tools attributed to the Equation group originated from both the NSA and CIA 9 Mar
Pro Researchers link Middle East attacks to new victim in Europe Kaspersky Labs show links between the massive Shamoon attack in Saudia Arabia and a new attack against European target 7 Mar
Pro Free decryption tools available for Dharma ransomware Researchers created decryption tools for the Dharma ransomware after someone recently leaked the decryption keys for the program online 6 Mar
Pro Today’s apps need layers of protection TechFire hears that application owners bear ultimate responsibility for protections, irrespective of where or how it is hosted 3 Mar
Pro Robots as bad as IoT devices for security vulnerabilities Researchers find basic security weaknesses in robot software components from several vendors 2 Mar
Pro Ransomware is booming Trend Micro research confirms trend, but Microsoft’s stepped up patch programme is working 1 Mar
Pro Ransomware ‘support’ chats reveal criminal ruthlessness F-Secure publishes chat transcripts between victims and gang's 'support rep' 28 Feb
Pro Who should be on an insider risk team? Catching an insider taking confidential information doesn't happen by chance, writes Ryan Francis 28 Feb
Pro UK Police arrest suspect in Deutsche Telecom router hack German prosecutors request detention under European Arrest Warrant of man suspected of building million-router botnet 23 Feb
Pro Changing threat landscape for app security TechFire series talks hybrid environments, new threats and keeping your critical apps safe 22 Feb
Pro Security experts urge a focus on the basics Cybersecurity advice from RSA conference looks to asset protection, ID management and reducing reliance on tech 20 Feb
Pro AI key to development in many areas Alphabet’s Schmidt talks AI development, raising security concerns and open Internet 20 Feb
Pro Line between cyber-crooks and cyber-spies getting blurrier Incidence of crooks that can be government payrolls to increase, says expert 17 Feb
Pro Microsoft unveils a host of new security capabilities New features for Windows and Office 365 aim to help businesses with cybersecurity 13 Feb
Pro IT and C-level leaders point fingers at each other over cyberdefence IT says cyberattacks will cost double bosses' estimate, finds survey 10 Feb
Pro IoT Cybersecurity Alliance will make IoT systems safer Heavy-weight alliance to study vulnerabilities and educate consumers and businesses on how to defend themselves 10 Feb
Pro Malware distributors switch to less suspicious file types Recent email-based malware distribution campaigns have used malicious LNK and SVG attachments instead of JavaScript 7 Feb
Pro Hackers seek to recruit company insiders Researchers have observed a growing tendency among online black market dealers to recruit company insiders 3 Feb
Pro 2017 may well be a bad year for security High-profile breaches are the tip of the iceberg. Many have never been detected or disclosed — and without major infrastructure changes, it'll only... 3 Feb
Pro Increasing cybersecurity risk for Irish organisations Awareness, c-suite understanding and budgets all lacking, says report 2 Feb
Pro Spam is making a major comeback Adware also on the rise, finds Cisco Annual Cybersecurity Report 2 Feb
Pro Spear phishing tough to block, even when using automation tools Difficulty implementing tools makes standardised protections difficult, says research 31 Jan
Pro Compliance focus and too much expertise hurts security awareness programmes Success of security awareness teams hampered by lack of support 30 Jan
Pro OpenSSL issues new patches as Heartbleed still lurks Latest OpenSSL update may only address moderate-severity vulnerabilities, but admins shouldn't get lax about staying current with the patches 30 Jan
Pro GDPR preparation low among Irish organisations Data protection survey shows distinct trends on data breaches and readiness 20 Jan
Pro Is antivirus getting worse? Anti-virus software is worsening in the detection of both known and new threats 20 Jan
Pro Terrorists are winning the digital arms race Countries need to work together to craft an online counternarrative, say experts 18 Jan
Pro Ireland ranks highly for cybersecurity pro demand Skills shortage in cybersecurity, but measures are working, study finds 17 Jan
Pro Suspected NSA tool hackers dump more cyberweapons Political motivation suspected in Shadow Brokers hacking tool release 16 Jan
Subscribers 0
Fans 0
Followers 0
Followers