Pro Virtualisation doubles the cost of security breach When a security incident involves VMs, recovery costs double compared to the traditional environment 25 Aug
Life Latest Ashley Madison data dump may not genuine Curious PC owners at risk of downloading malware from dud torrents 24 Aug
Life Hackers release full data dump from Ashley Madison Affairs website user data out in the open, many will have explaining to do 19 Aug
Life Darkode vendor of Facebook malware pleads guilty to one charge Eric L. Crocker and others created a botnet by infecting computers through social network 18 Aug
Pro Google Admin app zero day allows malicious apps to read files Android Admin app vulnerability can allow Google for Work account credentials to be stolen 18 Aug
Trade Kaspersky denies faking anti-virus info to thwart rivals Reuters article quoted anonymous sources saying Kaspersky tagged benign files as dangerous, possibly harming users 17 Aug
Life Italian teen finds two zero-day vulnerabilities in OS X Exploit yields root access to computers 17 Aug
Trade Re:Sure completes €250k funding round Ten jobs to be created at security solutions provider as UK expansion beckons 13 Aug
Pro Docker Content Trust steps up container security Standard security framework for Docker images being developed via open source key-sharing 12 Aug
Pro Asprox botnet, a long-running nuisance, disappears Operators may be regrouping to evade detection, according to Palo Alto Networks 11 Aug
Life Carphone Warehouse hack exposes 2.4m UK customers Irish customers unaffected after security breach discovered last week 10 Aug
Blogs Worst idea, ever! Offensive cyberwarfare capabilities for private companies is right up there with motorbike ashtrays 7 Aug
Life Tesla patches Model S after researcher software hack Demonstration allowed engine to be turned off while driving 7 Aug
Pro Dell opens up on ‘Emissary Panda’ hacking group SecureWorks has tracked another apparently Chinese espionage group. For organisations, it's a familiar story 6 Aug
Pro Data sharing paramount after a security incident US attorney advises organisations on what to do post breach, with emphasis on information, not attribution 5 Aug
Pro Ransomware not all it’s cracked up to be Readily detectable and in some cases can be forced to cough up frozen data without paying up, says researcher 5 Aug
Pro Three delivers mobile data security and optimisation Businesses to get improved security and control with CWSI, Wandera partnership 4 Aug
Life Yahoo tackles large malvertising campaign in ad network Ads with malicious code may have appeared across Yahoo's sites 4 Aug
Pro Companies should have offensive cyber-capabilities US counterterrorism expert advocates companies going on the offensive 4 Aug
Pro Cisco’s SDN controller has a security hole Company issues software to plug a root user access vulnerability 4 Aug
Pro Simple tool used to create malicious Office files Check Point detects new version of Office Exploit Builder — malicious attachments on tap 28 Jul
Pro HP leads Windows 10 push with security focus New devices capitalise on new security features of upcoming OS 27 Jul
Life HP study finds smart watches could do more to keep user data safe Protection from hackers lacking, among other issues, report researchers 24 Jul
Pro Microsoft to make enterprise security tools generally available Two services set for generally available as part of push to improve the security of businesses’ data 23 Jul
Life Belgian government phishing test goes off-track Phishing drill derailed through lack of information 23 Jul
Blogs Attention grabbing Another high-profile hack hits the headlines, and this time it is very personal 22 Jul
Pro Google critical of proposed security tool export controls Controls on exporting hacking tools are 'dangerously broad and vague' and would hurt the security research community 22 Jul
Life End of OS X Mountain Lion support is nigh Security updates expected to cease in September 22 Jul
Life Hackers demo car highway hijack Video shows car function hijack via an internet connection 22 Jul
Longform Next-generation endpoint protection not as easy as it sounds Endpoint protection technology is making strides and may soon be touted as antivirus 21 Jul
Life Spam rate falls below 50% for first time in a decade Junk e-mail volume peaked in June 2009 17 Jul
Pro Salesforce deploys Shield for better enterprise app security New suite targets companies with regulatory, compliance, or governance requirements 15 Jul
Pro Ransomware can be beaten with simple file-system security A study has concluded encryption and file deletion programmes are not as unstoppable or frightening as initially thought 10 Jul
Pro United Airlines blames outage on router Cisco says it is offering help; NYSE, WSJ glitches unrelated? 9 Jul
Pro Espion achieves CREST accreditation, an Irish first Exclusive membership ensures differentiation, says MD 7 Jul
Pro IT pros express major concerns on the security landscape Sobering reading from recent IT security survey, but comfort too as more taking pragmatic approaches 3 Jul
Pro VPN users may not be as safe as they think User information may be exposed due to protocol issue 2 Jul
Pro Critical flaw in ESET products demonstrates spy group interest in AV Flaw could allow attackers to compromise systems through various sources 25 Jun
Pro Ease of deployment and advanced functions drive European UTM sales Unified threat management appliances a bright spot in otherwise flat security appliances market, says IDC 24 Jun
Subscribers 0
Fans 0
Followers 0
Followers