This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

FEATURED

Facebook and WhatsApp rivals hit by DDoS attacks

Facebook and WhatsApp rivals hit by DDoS attacks

Two technology start-up companies which are seen as more secure alternatives to Facebook and WhatsApp were hit by distributed denial of service (DDoS) attacks over the weekend.

LATEST NEWS

Londoners agree to give child away in return for free WiFi

Londoners agree to give child away in return for free WiFi

Hundreds trapped and exposed by fake 'poisoned' WiFi hotspot.

Cybercrime-as-a-service the new criminal business model

Cybercrime-as-a-service the new criminal business model

A new report from Europol's European Cybercrime Centre (EC3) reveals that cybercrime is being increasingly commercialised, and by criminals who use legitimate services to hide their activities.

Apple now the most frequently phished brand in the world

Apple now the most frequently phished brand in the world

Phishing for Apples becomes a popular cyber-criminal sport

19 million Windows PCs still vulnerable to Stuxnet zero-day

19 million Windows PCs still vulnerable to Stuxnet zero-day

The Stuxnet worm is still threatening IT systems some three years after its role in damaging Iranian nuclear equipment.

PRODUCT REVIEWS

McAfee Email Protection

starstarstarstarstar
McAfee Email Gateway protects networks from viruses, undesirable content, spam and other threats.

Barracuda Spam Firewall 400 v6.1

starstarstarstarstar
The Barracuda Spam Firewall is an integrated hardware and software solution designed to protect the email server from spam, virus, spoofing, phishing and spyware attacks.

Axway MailGate SC v5.4

starstarstarstar
MailGate is a secure collaboration gateway appliance which combines email security and content management gateway functionality.

Virtual Events

Opinions

Throwaway tablets threaten our children

Throwaway tablets threaten our children

Used and broken Android tablets often retain access to passwords even when wiped - so be careful how you dispose of them says Ken Munro.

Wearable technology: A secure approach to business

Wearable technology: A secure approach to business

Wearable technology raises many of the same concerns as smart phones and USBs - recording, storing and transmission of data by individuals - and your security policies should include that risk says Paul Martini.

How choosing your own device (CYOD) can help empower your workforce

How choosing your own device (CYOD) can help empower your workforce

If implemented well, choosing your own device (CYOD) brings benefits beyond BOYD or company-imposed mobile devices says David Brady.

Director's Cut

Sign up to our newsletters