FEATURED

GitHub attack - evidence points to China

GitHub attack - evidence points to China

China is being accused of pulling unwitting users into DDos attacks on the GitHub website to hit anti-censorship activists.

LATEST NEWS

'Volatile Cedar' cyber-spies discovered

'Volatile Cedar' cyber-spies discovered

Cyber-espionage by newly discoverd hacking group dubbed Volatile Cedar, believed linked to a Lebanese political group, leads to hundreds of webservers getting hacked.

IBM invests £2bn in IoT

IBM invests £2bn in IoT

IBM has a £2 billion development programme better integrate data into its plaforms via a new internet of things unit, as well as creating a new a cloud platform.

FBI, Europol and MI6 gang up on tech firms over encryption

FBI, Europol and MI6 gang up on tech firms over encryption

Worldwide law enforcement continues to voice concerns over technology companies' increasing use of encryption.

UK Safari users able to sue Google over privacy

UK Safari users able to sue Google over privacy

Courts tell Safari users they can sue Google over cookie privacy violation, considered ironic given Google's support for combatting government surveillance.

PRODUCT REVIEWS

BeyondTrust UVM20 Security Management Appliance

starstarstarstar½
The BeyondTrust UVM20 Security Management Appliance is the preconfigured hardware offering of Retina CS Enterprise Vulnerability Management.

Core Security Core Insight

starstarstarstarstar
Core Security’s Core Insight is the gold standard for penetration testing and vulnerability assessment.

Qualys Express Lite

starstarstarstarstar
Qualys Express Lite is a cloud-based vulnerability assessment tool intended for small businesses.

Upcoming eConference

Opinions

Organisations are compromised - time to Respond!

Organisations are compromised - time to Respond!

In the wake of successful cyber-attacks, and security incidents taking down some of the biggest brands on the planet, impacting critical infrastructure and banking systems alike, it may be asserted that, when it comes to technology, by evidenced implication, it would seem to be exposed, fragile and vulnerable.

Spear Phishing: Extracting the sting from infected documents

Spear Phishing: Extracting the sting from infected documents

Targeted emails with infected attachments are the hacker's weapon of choice but there are ways to avoid being spiked by spear phishing says Noam Green.

You think you've nothing to steal? Hackers don't agree.

You think you've nothing to steal? Hackers don't agree.

Few understand the value of their website to hackers says Ilia Kolochenko, warning that even an individual blog is potentially at risk.

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US