Pro Machine learning enables new Gmail security features New protections available to enterprise customers 6 Jun
Pro Lack of IoT security a deep concern in enterprise Enterprises not yet managing the risks very well, study finds 1 Jun
Pro Cisco and IBM in historic cybersecurity partnership Tech giants join forces to put customers ahead of competition 1 Jun
Pro Why can’t security have SLAs? While 100% uptime is a pipe dream, some vendors think it unrealistic to even place parameters on security 31 May
Pro Caught in the breach – what to do first Breaches are a fact of life in a connected world. A panel of experts discuss damage minimisation 30 May
Pro WannaCry was a Windows 7 phenomenon Weakness of Windows 7’s Defender was partly to blame for the WannaCry ransomware outbreak 24 May
Pro Secure IoT networks, not the devices Cisco’s damage limitation for when IoT devices are compromised 24 May
Life Focus on research: George Grispos, Lero The role of forensics, tackling the skills gap and why the human factor remains the most serious security threat 23 May
Pro EternalRocks network worm uses seven NSA hacking tools New EternalRocks network worm observed using NSA hacking tools 22 May
Pro The worst of WannaCry is yet to come, warn experts Massive scale of ransomware attack exposed significant weaknesses in global IT 18 May
Pro Shadow Brokers tease more Windows exploits and cyberespionage data Group plans to sell more exploits and cyberespionage data via subs service 17 May
Pro WannaCry ransomware might have link to North Korea Researchers say earlier version of shared code with hacking tool used by Lazarus Group 16 May
Pro DocuSign hacked, e-mail addresses stolen Digital signiture service had warned of phishing e-mails spoofing its brand 16 May
Pro WannaCry attack may be a demonstration Widespread attack may be a 'shot across the bows,' says expert 15 May
Life How to guard against ransomware, and should you ever pay up? Handing over Bitcoins is no guarantee you'll get your data back 15 May
Life US blames stockpiled vulnerability for WannaCry attack Company says stockpiling a big problem 15 May
Life Old Windows PCs can stop WannaCry ransomware with new Microsoft patch Redmond publishes patch for Windows XP, Server 2003 and 8 15 May
Blogs Visible measures or real security? Is the laptop ban justified, or just another liquids fiasco? 12 May
Pro Laptops from HP found to be recording keystrokes Conexant audio driver may have accidentally implemented the keylogging function 12 May
Pro New IoT malware targets 100,000 IP cameras via known flaw Malware has emerged exploiting vulnerabilities reported in March 10 May
Life Supply chain attack hits Mac users of HandBrake video converter app Mac users who downloaded the app earlier this month may have their computers infected with the Proton Trojan 9 May
Life Sneaky Gmail phishing attack fools with fake Google Docs app Russian hackers resorted to a similar method to abuse the OAuth protocol to phish user accounts 4 May
Pro Security-as-a-service model gains traction New report finds mid-tier companies are increasingly turning to security-as-a-service offerings to manage their network security needs. 27 Apr
Pro Cyberespionage and ransomware on the rise in new breach report Tenth annual Verizon report shows a major rise in espionage, ransomware and phishing 27 Apr
Life Russian hackers use OAuth, fake Google apps to phish users The phishing schemes can work, in spite of Google's two-step verification, Trend Micro said. 26 Apr
Pro HipChat resets user passwords after possible breach In some cases, messages in chat rooms may have been exposed 25 Apr
Pro A new tool tests for NSA spyware Script detects a related code implant and shows as many as 100,000 systems worldwide may be infected 24 Apr
Pro Rising security risk of the citizen developer Citizen developers may help enterprises to develop apps more quickly, but what is this new breed of developer going to do to enterprise security? 18 Apr
Life Microsoft fixes 45 flaws, including three actively exploited vulnerabilities Patch Tuesday includes fixes for critical flaws in IE, Edge, Office, Windows and .Net 13 Apr
Pro Detecting insider threats is easier than you think Security experts weigh in on stopping the danger from your own employees 13 Apr
Pro Attacks exploit unpatched vulnerability in Microsoft Word Attackers have been exploiting a zero-day vulnerability in Microsoft Word since January to infect computers with malware 11 Apr
Pro Application ‘rush to release’ causes security risks Nurturing developer talent can help ensure adherence to secure coding practices 10 Apr
Pro GDPR implementation from a cybersecurity perspective Demonstrating security by default may be a tricky prospect 10 Apr
Pro Here’s why virtual CISOs meet a very real business need If a full time officer is not needed, perhaps consider a virtual one 10 Apr
Pro IoT malware exhibits destructive behaviour Researchers have observed attacks against IoT devices that wipe data from infected systems 10 Apr
Pro Apache Struts 2 exploit used to install ransomware on servers Attackers exploit a Struts vulnerability patched in March to install the Cerber ransomware on Windows servers 7 Apr
Pro Cisco issues variety of security warnings on wireless gear Cisco issues one critical warning for vulnerability in Aironet 1830 Series and 1850 Series Access Points 6 Apr
Pro A third of malware is 0-day and missed by legacy AV At least 30% of malware today is new, zero-day instances is missed by traditional antivirus defences, according to a new report 6 Apr
Subscribers 0
Fans 0
Followers 0
Followers