FEATURED

ICYMI: Adblock threatens OSX; Thomson customers exposed; AM leaker 'a woman'; AM police call on white hat help; Malaysia cyber alert

ICYMI: Adblock threatens OSX; Thomson customers exposed; AM leaker 'a woman'; AM police call on white hat help; Malaysia cyber alert

In this week's In Case You Missed It (ICYMI): Adblock Plus weakens Mac OSX ? Thomson breach exposes hundreds; Madison insider a woman says McAfee - police call for 'white hat' help; Cyber-attack alert in Malaysia.

LATEST NEWS

BitTorrent moves to patch reflective DDoS attack flaw

BitTorrent moves to patch reflective DDoS attack flaw

Vulnerable libuTP protocol could have been used to force torrent apps to send malicious traffic

ISIS hacking leader killed by drone strike

ISIS hacking leader killed by drone strike

The alleged leader of ISIS' CyberCaliphate hacking group, Junaid Hussain, is believed to have been killed in a recent drone air strike

Zero-Day, Angler kit exploits help drive up malvertising by 325%

A Cyphort Labs study on malvertising indicates a massive uptick with this form of attack has taken place over the last few years driven by the proliferation of zero-day and Angler kit exploits.

PRODUCT REVIEWS

Varonis DatAdvantage and Data Classification

starstarstarstarstar
Varonis DatAdvantage and the Data Classification Framework work to identify where any and all of your sensitive and proprietary information lies.

Identity Finder Sensitive Data Manager

starstarstarstarstar
Identity Finder Sensitive Data Manager takes a robust approach to data leakage prevention, offering maximum security across almost any networked device.

Code Green Networks TrueDLP

starstarstarstar½
Code Green Network's TrueDLP product is an extremely effective solution to data leak protection.

Upcoming Webcasts

Opinions

Pre-empt the regulations and safeguard your data NOW!

Pre-empt the regulations and safeguard your data NOW!

Take steps now to protect your data ahead of changes to the General Data Protection Regulations in Europe, says Andy Hardy.

Sun, sea and shadow IT

Sun, sea and shadow IT

Chris Mayers provides warnings and advice for firms to help them stay safe as more workers log on when on holiday.

Privileged identities are at the core of today's cyber attacks

Privileged identities are at the core of today's cyber attacks

Given the difficulty of preventing them, we should focus instead on minimising the damage from cyber-attacks, says Philip Lieberman.

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US