FEATURED

Tor-fuelled Trojan gets stealthy with steganography

Tor-fuelled Trojan gets stealthy with steganography

New research by security vendor AVG has revealed that a variant of the well-known Vawtrak banking Trojan is using some unusual methods to hide what it is doing in an attempt to evade detection.

LATEST NEWS

Hot and bothered air-gapped PCs open to Bitwhisper attack

Hot and bothered air-gapped PCs open to Bitwhisper attack

Security researchers at Ben Gurion University in Israel have continued their examination of security on air-gapped PCs, finding that they can be compromised using specially-designed malware measuring tiny fluctuations in heat.

Over 700,000 home routers threaten enterprise security

Over 700,000 home routers threaten enterprise security

Cisco researcher warns of flaws in devices ISPs give to customers.

Zero-day opens Cisco phones to eavesdropping

Zero-day opens Cisco phones to eavesdropping

VOIP flaws offer a route into your data, with CISCO latest compromise recorded.

Airbus to build virtual reality cyber-centre for MoD

Airbus to build virtual reality cyber-centre for MoD

Airbus Innovations Group has been awarded a £1.4 million contract to build a Virtual Cyber Centre of Operations (VCCO) for the military, with the aim of helping the MoD detect and respond to cyber-attacks.

PRODUCT REVIEWS

Tenable Network Security Nessus

starstarstarstarstar
Tenable Network Security Nessus is one of the most comprehensive and widely deployed vulnerability assessment tools.

Skybox View Enterprise Suite

starstarstarstarstar
The Skybox Enterprise Suite is an enterprise vulnerability assessment tool that is deployed to aid in vulnerability and threat management, as well as security policy management.

Tripwire IP360

starstarstarstar½
The Tripwire IP360 appliance is a solution to advanced enterprise threat detection, vulnerability management and risk assessment.

Upcoming Webcasts

Opinions

Five steps to creating a secure software defined environment

Five steps to creating a secure software defined environment

Security is needed everywhere within the software-defined data centre as physical security is no longer an adequate defence against current threats says Dr Gerhard Knecht.

Cloud app ecosystems and what they mean for enterprise data

Cloud app ecosystems and what they mean for enterprise data

Unsanctioned subsidiary Apps are coming into the enterprise via sanctioned 'anchor' apps - with 35.1 percent of all app sessions occuring across four main ecosystems of Box, Dropbox, Google Apps, and Salesforce explains Rajneesh Chopra.

Cyber snipers: are you the target?

Cyber snipers: are you the target?

IT staff have greater access privileges - and ironically, even more so when they are junior - making them worthwhile researching by spear-phishers warns Kev Pearce.

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US