This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

MORE NEWS

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise.

Cybercrime threat landscape evolving rapidly

Cybercrime threat landscape evolving rapidly

New research claims to show that, whilst spam levels fell to a five-year low last month, the increasing complexity of cyber-criminal attacks shows no sign of easing, with increasing levels of malware attacks and dangerous PDFs rapidly becoming the norm.

Hackers tap flaws in Amazon cloud to host DDoS botnets

Hackers tap flaws in Amazon cloud to host DDoS botnets

Profitable and easy-to-use vulnerability exploited by cybercriminals says security researcher

PRODUCT REVIEWS

MobileEther v2.0 by iboss

starstarstarstarstar
With employees mixing personal and business applications on their mobile devices, parameters for security must be imposed. This product is also considered very good value for money.

BlackBerry Enterprise Service 10 BES10

starstarstarstarstar
With employees mixing personal and business applications on their mobile devices, parameters for security must be imposed. The product-set offers value for money.

Mobile Enterprise Compliance and Security Server MECS v1.9.4.2 by M.A.D. Partners

starstarstarstarstar
With employees mixing personal and business applications on their mobile devices, parameters for security must be imposed. We find this product is very good value for money.

Virtual Events

Opinions

Real threats start with humans, not technology

Real threats start with humans, not technology

When the two IPs meet (intellectual property and internet protocol) the value of the business becomes vulnerable says Dave King, with IT often just providing a sticking plaster to hide C-suite ignorance.

Securing the energy industry: is success a dead CERT?

Securing the energy industry: is success a dead CERT?

Industry needs a brighter collaborative approach to help bring it out of the dark ages says Alan Carter

The science behind DDoS extortion

The science behind DDoS extortion

Don't capitulate, have a plan in place, and of course, prevention is better than cure when it comes to tackling the prospect of DDoS ransom attacks says Dan Holden.

Director's Cut

Sign up to our newsletters