FEATURED

Lizard Squad downs DNS registrar, hacks Lenovo website

Lizard Squad downs DNS registrar, hacks Lenovo website

Less than a week after the discovery of the pre-installed Superfish bloatware on Lenovo laptops, the company's website has been hacked, believed to be by the Lizard Squad.

LATEST NEWS

Jetty web servers vulnerable to Heartbleed-style attacks

Jetty web servers vulnerable to Heartbleed-style attacks

A critical flaw found on open-source Jetty HTTP web servers could - if left unpatched - lead to hackers hijacking internet sessions and stealing sensitive data.

Banking Trojan 'Vawtrak' spotted in the wild

Banking Trojan 'Vawtrak' spotted in the wild

Banking Trojan 'Vawtrak' has been spotted in the wild, and it's 'much improved' compared to a year ago.

Global phone firm Gemalto confirms likely GCHQ/NSA attacks

Global phone firm Gemalto confirms likely GCHQ/NSA attacks

European SIM card supplier Gemalto, which supplies billions of phone cards and services to operators like Vodafone and Verizon, has confirmed it was "probably" hacked by spies from GCHQ and America's NSA.

UK's NCA leads Europol take-down on Ramnit botnet

UK's NCA leads Europol take-down on Ramnit botnet

The National Crime Agency has led its latest major malware take-down, clubbing together with Europol's European Cybercrime Centre (EC3), private sector and CERT-EU to disrupt the widely-spread Ramnit botnet

PRODUCT REVIEWS

Norse DarkWatch

Threat intelligence appliance that ties the Norse DarkMatter infrastructure to your network.

iSight Partners ThreatScape

Adds a lot of value to your security stack by applying threat intelligence. Provides a prodigious amount of extremely useful research, much of it from analysts around the globe.

SurfWatch CSuite

This is a very good threat intelligence tool where almost all of the threat sources and analytics are under the covers.

Upcoming Webcasts

Opinions

Turning the tide on APTs and nation state attackers

Turning the tide on APTs and nation state attackers

Deal with APT intruders logically, not emotionally, and get the upper-hand - even if that means leaving them on the network says Mike Auty,

Ensuring mobile data remains secure

Ensuring mobile data remains secure

Containerisation - separating business and personal data and apps - is an effective way to ensure BYOD doesn't compromise corporate data security says David Brady.

Securing remote Access with token-free authentication

Securing remote Access with token-free authentication

Token-free, multi-factor authentication using mobile phones provides the real-time convenience and flexibility that today's work environment requires says Torben Andersen.

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US