Pro Successful network defence requires a change in thinking Microsoft's Lambert urges security experts to think in terms of network graphs, not asset lists 15 Feb
Pro Sony attackers thought to be behind multiple large attacks Security researchers have found similarities in malware and attack methods and now know what digital breadcrumbs to follow 15 Feb
Pro Cisco VPN flaw exposes security appliances to remote hacking Firewalls running Cisco Adaptive Security Appliance software can be compromised remotely with malformed UDP packets 12 Feb
Pro Terrorists will use secure alternatives to avoid encryption backdoors Study says there are 546 encryption products that lie outside US law, says study 12 Feb
Pro Move your DMZ to the cloud for effective DDoS mitigation, argue Nostra’s Griffin and Kane Cloud scale can help combat large scale attacks 10 Feb
Blogs Basic failures undermine security postures Organisations seem to be consistently failing to address the basics of information security 10 Feb
Longform Biometrics and enterprise – the problem with passwords ALEX MEEHAN finds that passwords just don’t cut it anymore, but biometric solutions may not be quite there yet 10 Feb
Pro Algorithm developed to predict future botnet attacks Spam could one day be curtailed with an algorithm that can trace botnets 9 Feb
Pro Cybercriminals cash-out with PowerShell and other legitimate tools Kaspersky Lab found three cybercrime gangs using customised malware and APT-style reconnaissance to get the stolen money into their pockets 9 Feb
Pro Dell BIOS verification extends security focus BIOS protection now to include advanced authentication, encryption, and malware detection 8 Feb
Life Apple confirms iPhone-killing Error 53, says it’s about security Smartphone's most mysterious and dangerous bug tied to Touch ID tampering, unauthorised repairs 8 Feb
Pro Mind the security gap, warns Bagnall of The Email Laundry Cybersecurity is moving away from reactive protection models 5 Feb
Life Google fixes critical Wi-Fi and media-processing flaws in Android Attackers could compromise devices with Broadcom Wi-Fi chips over the wireless network 3 Feb
Pro More than a quarter of all malware variants created in 2015 2015 saw record malware levels with more than 84 million new samples collected 2 Feb
Pro Harvard study refutes ‘going dark’ argument against encryption Unencrypted data, which will be accessible to law enforcement, will continue to dominate the Internet 1 Feb
Life Oracle to kill Java browser plug-in One-year countdown begins on attackers' favourite vulnerability 29 Jan
Pro Tor and the enterprise 2016 – blocking malware, darknet use and rogue nodes Admins debate benefits of whether to allow anonymous browsing 26 Jan
Pro Government websites targeted in DDoS attacks CSO, Oireachtas and courts sites hit in wave of attacks 22 Jan
Radio The man from Alison Mike Feerick on making education free for all, and tips on building a better password 22 Jan
Blogs Denial of service, denial of business DDoS attacks are becoming more effective and more common 22 Jan
Pro Lottery.ie outage caused by DDoS attack Statement from the National Lottery confirms outage was caused by attack 21 Jan
Pro Oracle issues record number of patches Admin are advised to patch immediately after the company issued 248 patches, its largest-ever release 21 Jan
Pro Confidence falling in ability to fend off attackers Cisco survey finds greater demand for transparency as organisations struggle to cope with tide of attacks 21 Jan
Pro Advocacy group calls on health-care industry to adopt medical device security principles Hippocratic Oath proposed as basis for medical device manufacturers 20 Jan
Life Linux zero-day affects most Androids, millions of PCs Vulnerability gives attackers ability to delete files, view private information, install unwanted programs 19 Jan
Blogs Cloudy, with a chance of outage An outage in a cloud service gets widely reported, but are they really all that bad? 18 Jan
Trade Courting the channel: Dermot Hayden, Sophos After 30 years the security vendor is as determined as ever to dominate the Irish market 18 Jan
Pro Cisco launches tool to uncover shadow IT in enterprise With Cloud Consumption as a Service, Cisco aims to sniff out unsanctioned cloud tools in the workplace 18 Jan
Pro OpenSSH patches leak that could expose SSH keys Rogue or compromised OpenSSH servers can read private SSH keys from the memory of unpatched clients 18 Jan
Pro Most companies can’t detect compromised credentials Survey finds in incident detection and response, nearly two thirds cannot detect credentials that have been compromised 14 Jan
Pro Trend Micro flaw could have allowed attacker to steal passwords Problem patched, and another remote execution flaw found by a well-known Google security researcher 13 Jan
Pro Drupal to secure its update process with HTTPS HTTPS support and other issue fixes to be added with content management system's update mechanism after weaknesses found 12 Jan
Longform Antivirus software could make companies more vulnerable Security researchers are worried that critical vulnerabilities in AV products are too easy to find and exploit 11 Jan
Pro Blackphone update closes security hole SilentCircle used a third-party component that potentially exposed the secure Blackphone to attack 8 Jan
Pro Continued MD5 support threatens crypto protocols Authentication and impersonation attacks demonstrated against protocols supporting MD5 8 Jan
Pro Protecting against ransom malware KeepItSafe describes the full horror of a cypto-lock attack 8 Jan
Pro Ransomware doubled last year, shifted focus to enterprise Malware escalation and CryptoLocker attacks are 2015 cybersecurity headlines, reports Kaspersky 6 Jan
Pro Energy industry hackers bolster arsenal BlackEnergy adds disk wiper and SSH backdoor to repertoire 5 Jan
Blogs Avoid a holiday security incident A few tips to help you stay safe as you go about the holiday shops 22 Dec
Subscribers 0
Fans 0
Followers 0
Followers