Billions of pounds will be invested in the NHS to accelerate the health service's transition into a paperless system and improve information-security
Google says Avast introduced a serious security hole when it created its Avastium secure web browser from a Chromium fork.
Researcher Wesley Wineberg said he's been censured due to his participation in the Facebook bug bounty programme.
A mysterious Good Samaritan has replaced the code on certain parts of the villanous Dridex botnet with Avira Anti-virus installers.
Both Dyre and Dridex Trojans now use a combination of local redirection and RAT to effectively escape detection by current anti-fraud and security tools, but Uri Rivner says real-time behaviour analysis can still spot the bad guys.
In instalment one of his four-part viewpoint series, Tony Collings outlines the first of his essential building blocks for the successful implementation of an IT project: have you got the business requirement right?
The threats faced and intelligence needed in enterprise security is always changing and the organisations that stay on top of these trends will be best placed to handle whatever comes their way says Mark Hughes.