Pro OpenSSL update fixes DROWN vulnerability Attack decrypts TLS sessions on servers supporting SSL v2, using RSA key exchange 3 Mar
Pro New Windows 10 feature to stymie advanced attacks Microsoft shows forthcoming service that will use machine learning to protect organisations 2 Mar
Pro Fixing the Internet’s routing security is urgent, requiring collaboration A volunteer participation program for ISPs to prevent route hijacks and IP spoofing is gaining some traction 29 Feb
Pro Firms detect breaches sooner, but attackers are getting nastier Extortion attacks are on the rise, finds Mandiant 29 Feb
Pro Companies paying hush money to data thieves Many are giving in to extortion rather than face ruin of dumped sensitive data 26 Feb
Pro Microsoft strengthens security tools for Azure, Office 365 Promised a new approach to enterprise security arrives 26 Feb
Pro BlackBerry looks to IoT with new cybersecurity practice Company will also focus on automotive IT security 25 Feb
Pro Japan’s infrastructure probed by cybergroup Security firm says the group may have links to APT 1, believed to be part of China's army 24 Feb
Blogs The right to remain silent Apple's stance on the San Bernardino shootings could prevent industrial scale surveillance 23 Feb
Life Bill Gates backs the US government in Apple’s iPhone privacy standoff Microsoft founder bucks Silicon Valley consensus 23 Feb
Pro US DoJ increases pressure on Apple for iPhone crack Apple will oppose court order, say lawyers, who want it compelled to assist FBI 22 Feb
Blogs Of back doors, back channels and moral high ground Is there more than meets the eye to the law enforcement request for an iPhone crack? 19 Feb
Life Twitter password recovery bug exposes 10,000 users’ personal information Company has notified those affected and will suspend users who exploited the bug 19 Feb
Life Instagram tightens security with two-factor authentication Extra layer of protection will benefit everyone - especially celebrities 18 Feb
Pro Unix bug puts Linux systems at risk Google and Red Hat researchers released a patch for a critical remote code execution flaw in glibc 2.9 and later 18 Feb
Life Cook says Apple will oppose court order rather than hack customers Court in California ordered company to assist the FBI to crack an iPhone 17 Feb
Pro Ransomware takes Californian hospital offline Network offline for more than a week, $3.6m demanded as ransom 17 Feb
Pro Companies more disposed to pay ransomware attacks Cyber insurance making companies more likely to pay up in ransomware attacks 16 Feb
Insights Ransomware attacks common for Irish organisations Preliminary survey results show extent of crypto-malware, and organisations’ response 15 Feb
Pro Successful network defence requires a change in thinking Microsoft's Lambert urges security experts to think in terms of network graphs, not asset lists 15 Feb
Pro Sony attackers thought to be behind multiple large attacks Security researchers have found similarities in malware and attack methods and now know what digital breadcrumbs to follow 15 Feb
Pro Cisco VPN flaw exposes security appliances to remote hacking Firewalls running Cisco Adaptive Security Appliance software can be compromised remotely with malformed UDP packets 12 Feb
Pro Terrorists will use secure alternatives to avoid encryption backdoors Study says there are 546 encryption products that lie outside US law, says study 12 Feb
Pro Move your DMZ to the cloud for effective DDoS mitigation, argue Nostra’s Griffin and Kane Cloud scale can help combat large scale attacks 10 Feb
Blogs Basic failures undermine security postures Organisations seem to be consistently failing to address the basics of information security 10 Feb
Longform Biometrics and enterprise – the problem with passwords ALEX MEEHAN finds that passwords just don’t cut it anymore, but biometric solutions may not be quite there yet 10 Feb
Pro Algorithm developed to predict future botnet attacks Spam could one day be curtailed with an algorithm that can trace botnets 9 Feb
Pro Cybercriminals cash-out with PowerShell and other legitimate tools Kaspersky Lab found three cybercrime gangs using customised malware and APT-style reconnaissance to get the stolen money into their pockets 9 Feb
Pro Dell BIOS verification extends security focus BIOS protection now to include advanced authentication, encryption, and malware detection 8 Feb
Life Apple confirms iPhone-killing Error 53, says it’s about security Smartphone's most mysterious and dangerous bug tied to Touch ID tampering, unauthorised repairs 8 Feb
Pro Mind the security gap, warns Bagnall of The Email Laundry Cybersecurity is moving away from reactive protection models 5 Feb
Life Google fixes critical Wi-Fi and media-processing flaws in Android Attackers could compromise devices with Broadcom Wi-Fi chips over the wireless network 3 Feb
Pro More than a quarter of all malware variants created in 2015 2015 saw record malware levels with more than 84 million new samples collected 2 Feb
Pro Harvard study refutes ‘going dark’ argument against encryption Unencrypted data, which will be accessible to law enforcement, will continue to dominate the Internet 1 Feb
Life Oracle to kill Java browser plug-in One-year countdown begins on attackers' favourite vulnerability 29 Jan
Pro Tor and the enterprise 2016 – blocking malware, darknet use and rogue nodes Admins debate benefits of whether to allow anonymous browsing 26 Jan
Pro Government websites targeted in DDoS attacks CSO, Oireachtas and courts sites hit in wave of attacks 22 Jan
Radio The man from Alison Mike Feerick on making education free for all, and tips on building a better password 22 Jan
Blogs Denial of service, denial of business DDoS attacks are becoming more effective and more common 22 Jan
Pro Lottery.ie outage caused by DDoS attack Statement from the National Lottery confirms outage was caused by attack 21 Jan
Subscribers 0
Fans 0
Followers 0
Followers