This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

FEATURED

Shellshock: Millions of servers under attack

Shellshock: Millions of servers under attack

In the wake of Shellshock, end-users and security managers race to patch web servers and desktops, but may be forgetting vulnerable embedded devices.

LATEST NEWS

Londoners agree to give child away in return for free WiFi

Londoners agree to give child away in return for free WiFi

Hundreds trapped and exposed by fake 'poisoned' WiFi hotspot.

Cybercrime-as-a-service the new criminal business model

Cybercrime-as-a-service the new criminal business model

A new report from Europol's European Cybercrime Centre (EC3) reveals that cybercrime is being increasingly commercialised, and by criminals who use legitimate services to hide their activities.

Facebook and WhatsApp rivals hit by DDoS attacks

Facebook and WhatsApp rivals hit by DDoS attacks

Two technology start-up companies which are seen as more secure alternatives to Facebook and WhatsApp were hit by distributed denial of service (DDoS) attacks over the weekend.

Apple now the most frequently phished brand in the world

Apple now the most frequently phished brand in the world

Phishing for Apples becomes a popular cyber-criminal sport

PRODUCT REVIEWS

McAfee Email Protection

starstarstarstarstar
McAfee Email Gateway protects networks from viruses, undesirable content, spam and other threats.

Barracuda Spam Firewall 400 v6.1

starstarstarstarstar
The Barracuda Spam Firewall is an integrated hardware and software solution designed to protect the email server from spam, virus, spoofing, phishing and spyware attacks.

Axway MailGate SC v5.4

starstarstarstar
MailGate is a secure collaboration gateway appliance which combines email security and content management gateway functionality.

Virtual Events

Opinions

Securing people: Protection in the age of IoT

Securing people: Protection in the age of IoT

The coming Internet of Things explosion is more than your firewall can cope with says Steven Rosen, advising companies to take additional measures to deal with new threats.

Throwaway tablets threaten our children

Throwaway tablets threaten our children

Used and broken Android tablets often retain access to passwords even when wiped - so be careful how you dispose of them says Ken Munro.

Wearable technology: A secure approach to business

Wearable technology: A secure approach to business

Wearable technology raises many of the same concerns as smart phones and USBs - recording, storing and transmission of data by individuals - and your security policies should include that risk says Paul Martini.

Director's Cut

Sign up to our newsletters