Pro Wearables could compromise corporate data Smart watches could lead to loss of sensitive data from the workplace 18 Jul
Pro Microsoft wins appeal against US government access to e-mails held overseas Decision has broad implications for tech companies and consumer privacy 15 Jul
Pro Cisco flexes security muscle at Cisco Live New automated security products help users find more threats, and remediate them, faster 14 Jul
Pro Stealthy cyberespionage malware targets energy companies Threat uses sophisticated techniques to evade detection and prepares the ground for more malware components 14 Jul
Pro Hacked 3D printers could commit industrial sabotage Hackers could introduce defects into printed products, researchers are warning 13 Jul
Trade Zinopy ensures visibility and security for KBC Bank Security provider to roll out IBM SIEM solution 12 Jul
Pro Cybersecurity firms step up intel sharing despite issues of trust The collaboration has been protecting companies from the latest cyberattacks 11 Jul
Pro Symantec bugfest highlights the dangers of security software Security software has worse flaws than the average application 6 Jul
Blogs Shuttering the shutterbugs Behold! Apple is looking for a way to remotely turn off your iPhone's camera 5 Jul
Pro EU plans $2bn investment in cybersecurity research Commission wants industry to contribute three-quarters of the cash 5 Jul
Pro Carbon Black puts humans back into threat sharing Detection eXchange relies on a different kind of intel 5 Jul
Life Second man pleads guilty to hacking entertainment industry celebrities Two not charged with actual leaking of videos and photographs 4 Jul
Pro More than 100 DDoS botnets built from Linux malware for embedded devices Default and hard-coded credentials have led to the compromise of IoT devices 4 Jul
Pro Android full-disk encryption vulnerable to cracking Security researcher demos crack of full-disk encryption on Qualcomm-powered Android devices running Lollipop or later 4 Jul
Pro Attackers rely on legit IT tools to carry out plans Malware unnecessary when attackers spoof regular users or admins 1 Jul
Life Mobile ransomware use jumps, blocking access to phones Kaspersky Lab has detected a spike among its own Android users 30 Jun
Life Flaws in Symantec products expose millions of computers to hacking High severity vulnerabilities in enterprise and consumer products could have allowed hackers to execute malicious code on computers with no user... 30 Jun
Pro Cerber ransomware targets enterprise via Office 365 Millions of Office 365 users were potentially at risk as ransomware targeting shifts from individuals to enterprises 29 Jun
Life New malware purports to be WhatsApp, Uber and Google Play Malicious app has spread through phishing campaigns over SMS 29 Jun
Trade Encryption sees largest increase in use in a decade But encryption tech spending falls as functionality is embedded in many tools 29 Jun
Pro Data stolen from PC by controlling fan noise Researchers use Fansmitter malware to transmit data 28 Jun
Life Bart ransomware proves effective without sophisticated encryption New malware locks user files in password-protected ZIP archives 28 Jun
Trade Intel is said to be mulling sale of security business Chipmaker has been talking to bankers about the sale, according to reports 27 Jun
Pro AWS, Microsoft cloud win US government security approval Three vendors are authorised to handle highly sensitive government data 24 Jun
Pro Sharp increase in corporate crypto-ransomware victims File-encrypting ransomware programs are on the rise and companies are increasingly their targets 24 Jun
Pro Severe flaws in widely used open source library threaten projects Input validation flaws in libarchive could lead to remote code execution 23 Jun
Life Apple fixes serious flaw in AirPort wireless routers Flaw could allow hackers to execute malicious code on affected devices 22 Jun
Life Massive Acer security breach exposes 34,500 online shoppers Online store was the victim of a data breach that lasted nearly a year 20 Jun
Pro People are the front line, says Rooney of Integrity360 People can be well-informed frontline defenders in the cyberwar 20 Jun
Pro Wise use means an end to equipment dumping, says Wisetek’s Higgins Waste is merely a point of view when it comes to IT infrastructure 20 Jun
Insights TechBeat: Data protection and compliance Despite the complex nature of threats and a changing compliance landscape, there are rays of hope in how Irish organisations are facing data... 20 Jun
Pro Industry must let go of outdated infosec ideals Secure Computing Forum hears pros and users must shed outdated ideas in current cyberthreat landscape 20 Jun
Pro Businesses must measure and understand cybersecurity activity inside their own organisation, advises Novi’s O’Dowd Today's approach to network design needs to be very different 20 Jun
Pro Pro-IS hacker pleads guilty to stealing data on US military personnel Prosecutors said his goal was to incite terrorist attacks 17 Jun
Pro IT worker at Panama Papers firm arrested in Geneva Arrest is part of investigation into millions of leaked documents 16 Jun
Pro Don’t run JS e-mail attachments: they can carry potent ransomware RAA locks users' files by using strong encryption 14 Jun
Pro Three ways to improve security as you embrace containers A rare opportunity to get application security right 13 Jun
Subscribers 0
Fans 0
Followers 0
Followers