FEATURED

ICYMI: Tea-loving hackers, Venom flaw and overworked CISOs

ICYMI: Tea-loving hackers, Venom flaw and overworked CISOs

This week's ICYMI column looks at a tea shop data breach, analysis on the Venom flaw and concerns over 'burnt-out' security professionals.

LATEST NEWS

Leaky Bluetooth smartphones & wearables can be tracked from 100m away

Leaky Bluetooth smartphones & wearables can be tracked from 100m away

Researchers at Context Information Security have discovered that smartphones, tablets, iBeacons, fitness trackers and other wearable devices using embedded Bluetooth Low Energy (BLE) could potentially be tracked from 100m away.

Fujitsu adds iris scanning to smartphone biometrics

Fujitsu adds iris scanning to smartphone biometrics

Smartphone users could be offered a new way to protect their devices. Fujitsu is set to introduce iris-scanning technology for phones as an alternative security measure.

Adult Friend Finder breach exposes millions of users

Adult Friend Finder breach exposes millions of users

A famous cartoon once said, "On the internet, no one knows you're a dog". But millions of users of online dating site Adult Friend Finder may discover that far more is known about them than they would care to admit.

PRODUCT REVIEWS

Gemalto SafeNet Authentication Service

starstarstarstar¾
SafeNet Authentication Service is a cloud-based authentication service that uses a wide range of tokens and custom agents to support multifactor authentication to include one-time passwords generated by a phone app, SMS, a hardware token or email.

Cyphercor LoginTC

starstarstarstar½
LoginTC from Cyphercor is a cloud-based solution that uses a mobile device or a desktop for authentication. It has easy-to-use iOS, Android and Chrome desktop applications to approve logins to a variety of products.

Imation IronKey F200 Flash Drive

starstarstarstarstar
The Imation IronKey F200 Flash Drive is a simple, easy to set up and extremely secure device for users who need to transport confidential data between computers.

Upcoming eConference

Opinions

'The best defence is a good offence' in evolving security, networking market

'The best defence is a good offence' in evolving security, networking market

Dieter Lott discusses the security and networking solutions market and how organisations should be adopting a new proactive approach to security breaches given that IT infrastructure is in a constant state of change.

Teach children to hack ethically to save them from dark side

Teach children to hack ethically to save them from dark side

Teach children to code and, yes, even to hack so they learn about the power and potential perils of the internet, says Nick Banks.

Protecting your assets from the front lines

Protecting your assets from the front lines

Patrick Peterson examines why organisations need to focus on both external and internal assets to address the phishing threat.

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US