Pro Focal Point: Beware of ransomware, says Threatscape’s Williams Take the necessary precautions, basic and beyond 11 Apr
Blogs Familiar themes in latest breach reports It's deja vu all over again with Mossack Fonseca hack 8 Apr
Pro Latest Flash zero-day used to spread ransomware Cerber crypto-malware spread through Flash vulnerability, reports Proofpoint 8 Apr
Pro Massive app-layer attacks could defeat hybrid DDoS protection Unusual application-layer DDoS attacks could spell trouble for defences 7 Apr
Pro New Azure tool helps IT tame SaaS apps Microsoft Cloud App Security reveals shadow IT and authorised cloud app usage, along with security controls to manage access 7 Apr
Life WhatsApp turns on end-to-end encryption Messages sent with the popular app may be much harder for law enforcement to access now 6 Apr
Pro Server software a soft target for ransomware Samsam spread by attacking unpatched JBoss app servers 6 Apr
Pro Three-year-old IBM patch for critical Java flaw is broken Attackers can easily bypass the patch to exploit a vulnerability that allows them to escape from the Java security sandbox 6 Apr
Pro Hands On: Surface Pro Type Cover with fingerprint ID Surface line adds to biometric options for Windows authentication 5 Apr
Life FBI will help US agencies with tools to unlock encrypted devices Feds did not commit on using the method tried on the San Bernardino iPhone 4 Apr
Pro Is the blockchain good for security? Blockchain is now being hyped as the solution to all inefficient information processing systems 4 Apr
Life Reddit’s removal of ‘warrant canary’ could hint at US demand for its user data Online discussion website has deletes critical passage from latest transparency report 1 Apr
Pro Merging firms appealing targets for attackers Companies and participants in M&A activity are tempting targets for cyberattackers, says report 31 Mar
Life Court vacates iPhone hack order against Apple, focus shifts to New York Order vacated after FBI said it had accessed data on terrorist’s phone 30 Mar
Pro One-fifth of IT pros admit a mobile data breach Survey shows wide uncertainty about whether smart phones and tablets were involved 30 Mar
Pro Hackers racing to compromise POS systems The transition to chip-based cards appears to have spurred cybercriminals to quickly find the low-hanging fruit, reports FireEye 30 Mar
Pro Google engineer finds flaw in Node.js NPM scripts Self-replicating worm can easily spread through the ecosystem 30 Mar
Life Uber dares hackers to find flaws, offers up to $10k bounty Biggest bounties are for being able to find customer credit card numbers, among other data 24 Mar
Life DoJ knew of possible iPhone-cracking method before Apple case Israeli company already involved in DEA efforts to bypass security measures 24 Mar
Pro Web giants publish new e-mail security standard Goal of the new mechanism is to ensure that encrypted email traffic is not vulnerable to man-in-the-middle attacks 23 Mar
Pro Symantec fixes high-risk flaws in its Endpoint Protection Security tools can have vulnerabilities and need regular patching too 22 Mar
Life FBI says it may have found a way to unlock iPhone in San Bernardino case Court hearing scheduled for today postponed as feds claim to have cracked iOS encryption 22 Mar
Pro CoreOS takes on software security for containers Clair project to tackle vulnerabilities in containerised software 21 Mar
Life Safari, Chrome and Flash Player hacked during first day at Pwn2Own Hackers take home $282,500 on the contest's first day 18 Mar
Pro Attack uses keylogger to hijack key business email accounts Companies from 18 countries targeted with the Olympic Vision keylogger, researchers warn 18 Mar
Pro Google doubles bounty for a Chromebook hack to $100,000 Top reward for anyone who can mount a successful attack in guest mode 15 Mar
Pro Reasons to resist a ransomware attack Four good reasons why you shouldn't pay to get your data back 15 Mar
Longform Inside Track: Outsourced security, outside views There are many benefits with a managed security service, not least of which are useful outside perspectives, writes ALEX MEEHAN 14 Mar
Pro Continuous assessment is the answer to minimising vulnerability, says edgescan’s Keary Better protection through continuous assessment across technology stacks 14 Mar
Pro User behaviour analytics is key to IT security, says Asystec’s McPhillips Real time information is enabling deep behavioural analytics 14 Mar
Insights TechBeat: Security — risk and cybercrime With the rise of cryptoattacks and risks from inside as well as outside the organisation, Irish IT pros outline their fears, risks and countermeasures 14 Mar
Longform The data breach reality It’s about more than technology in the race to protect data, but LESLIE FAUGHNAN finds handling the aftermath is as important as prevention measures 14 Mar
Pro Be wary of antivirus security certification Google security researcher warns of trusting certifications for AV products 14 Mar
Pro Two-year-old Java flaw re-emerges due to broken patch 2013 patch easily bypassed to attack the latest Java versions, say security researchers 14 Mar
Pro Teach someone to spot a phish and you’ll secure them for a lifetime, advises Email Laundry’s Bagnall Education and constant vigilance can beat the most sophisticated phishing attacks 14 Mar
Trade CMS Distribution appointed distributor for AVG Business Security Solutions Irish and UK distribution introduces AVG Business products to 3,000 reseller base 10 Mar
Pro Suspected Bush family hacker Guccifer to be extradited to US Temporary order gives authorities given 18 months to prosecute case 8 Mar
Life Apple shuts down first-ever ransomware attack against Mac users Malware seeded inside a legitimate BitTorrent application called Transmission 7 Mar
Pro Hacking back will only bring more trouble RSA panel warns there is no easy solution to online IP theft in response to economic espionage 4 Mar
Subscribers 0
Fans 0
Followers 0
Followers