Pro Symantec fixes high-risk flaws in its Endpoint Protection Security tools can have vulnerabilities and need regular patching too 22 Mar
Life FBI says it may have found a way to unlock iPhone in San Bernardino case Court hearing scheduled for today postponed as feds claim to have cracked iOS encryption 22 Mar
Pro CoreOS takes on software security for containers Clair project to tackle vulnerabilities in containerised software 21 Mar
Life Safari, Chrome and Flash Player hacked during first day at Pwn2Own Hackers take home $282,500 on the contest's first day 18 Mar
Pro Attack uses keylogger to hijack key business email accounts Companies from 18 countries targeted with the Olympic Vision keylogger, researchers warn 18 Mar
Pro Google doubles bounty for a Chromebook hack to $100,000 Top reward for anyone who can mount a successful attack in guest mode 15 Mar
Pro Reasons to resist a ransomware attack Four good reasons why you shouldn't pay to get your data back 15 Mar
Longform Inside Track: Outsourced security, outside views There are many benefits with a managed security service, not least of which are useful outside perspectives, writes ALEX MEEHAN 14 Mar
Pro Continuous assessment is the answer to minimising vulnerability, says edgescan’s Keary Better protection through continuous assessment across technology stacks 14 Mar
Pro User behaviour analytics is key to IT security, says Asystec’s McPhillips Real time information is enabling deep behavioural analytics 14 Mar
Insights TechBeat: Security — risk and cybercrime With the rise of cryptoattacks and risks from inside as well as outside the organisation, Irish IT pros outline their fears, risks and countermeasures 14 Mar
Longform The data breach reality It’s about more than technology in the race to protect data, but LESLIE FAUGHNAN finds handling the aftermath is as important as prevention measures 14 Mar
Pro Be wary of antivirus security certification Google security researcher warns of trusting certifications for AV products 14 Mar
Pro Two-year-old Java flaw re-emerges due to broken patch 2013 patch easily bypassed to attack the latest Java versions, say security researchers 14 Mar
Pro Teach someone to spot a phish and you’ll secure them for a lifetime, advises Email Laundry’s Bagnall Education and constant vigilance can beat the most sophisticated phishing attacks 14 Mar
Trade CMS Distribution appointed distributor for AVG Business Security Solutions Irish and UK distribution introduces AVG Business products to 3,000 reseller base 10 Mar
Pro Suspected Bush family hacker Guccifer to be extradited to US Temporary order gives authorities given 18 months to prosecute case 8 Mar
Life Apple shuts down first-ever ransomware attack against Mac users Malware seeded inside a legitimate BitTorrent application called Transmission 7 Mar
Pro Hacking back will only bring more trouble RSA panel warns there is no easy solution to online IP theft in response to economic espionage 4 Mar
Pro OpenSSL update fixes DROWN vulnerability Attack decrypts TLS sessions on servers supporting SSL v2, using RSA key exchange 3 Mar
Pro New Windows 10 feature to stymie advanced attacks Microsoft shows forthcoming service that will use machine learning to protect organisations 2 Mar
Pro Fixing the Internet’s routing security is urgent, requiring collaboration A volunteer participation program for ISPs to prevent route hijacks and IP spoofing is gaining some traction 29 Feb
Pro Firms detect breaches sooner, but attackers are getting nastier Extortion attacks are on the rise, finds Mandiant 29 Feb
Pro Companies paying hush money to data thieves Many are giving in to extortion rather than face ruin of dumped sensitive data 26 Feb
Pro Microsoft strengthens security tools for Azure, Office 365 Promised a new approach to enterprise security arrives 26 Feb
Pro BlackBerry looks to IoT with new cybersecurity practice Company will also focus on automotive IT security 25 Feb
Pro Japan’s infrastructure probed by cybergroup Security firm says the group may have links to APT 1, believed to be part of China's army 24 Feb
Blogs The right to remain silent Apple's stance on the San Bernardino shootings could prevent industrial scale surveillance 23 Feb
Life Bill Gates backs the US government in Apple’s iPhone privacy standoff Microsoft founder bucks Silicon Valley consensus 23 Feb
Pro US DoJ increases pressure on Apple for iPhone crack Apple will oppose court order, say lawyers, who want it compelled to assist FBI 22 Feb
Blogs Of back doors, back channels and moral high ground Is there more than meets the eye to the law enforcement request for an iPhone crack? 19 Feb
Life Twitter password recovery bug exposes 10,000 users’ personal information Company has notified those affected and will suspend users who exploited the bug 19 Feb
Life Instagram tightens security with two-factor authentication Extra layer of protection will benefit everyone - especially celebrities 18 Feb
Pro Unix bug puts Linux systems at risk Google and Red Hat researchers released a patch for a critical remote code execution flaw in glibc 2.9 and later 18 Feb
Life Cook says Apple will oppose court order rather than hack customers Court in California ordered company to assist the FBI to crack an iPhone 17 Feb
Pro Ransomware takes Californian hospital offline Network offline for more than a week, $3.6m demanded as ransom 17 Feb
Pro Companies more disposed to pay ransomware attacks Cyber insurance making companies more likely to pay up in ransomware attacks 16 Feb
Insights Ransomware attacks common for Irish organisations Preliminary survey results show extent of crypto-malware, and organisations’ response 15 Feb
Pro Successful network defence requires a change in thinking Microsoft's Lambert urges security experts to think in terms of network graphs, not asset lists 15 Feb
Subscribers 0
Fans 0
Followers 0
Followers