FEATURED

ICYMI:; Backdoor concerns; TalkTalk losses; EBay exploit; Safe-Harbour 2; Malwarebytes flaw

ICYMI:; Backdoor concerns; TalkTalk losses; EBay exploit; Safe-Harbour 2; Malwarebytes flaw

The latest In Case You Missed It (ICYMI) looks at; Investigatory Powers Bill; TalkTalk woes continue; EBay exploit unfixed; EU-US Privacy Shield agreed; Malwarebytes apologises for flaw.

LATEST NEWS

Robin Who? Dridex botnet replaced with antivirus software

Robin Who? Dridex botnet replaced with antivirus software

A mysterious Good Samaritan has replaced the code on certain parts of the villanous Dridex botnet with Avira Anti-virus installers.

Clean house to keep WordPress infection from coming back again and again

Clean house to keep WordPress infection from coming back again and again

Malware keeps re-infecting sites and installing multiple backdoors in WordPress websites, according to a researcher from Sucuri Security.

Report notes shift from individual cyber-crims to skilled adversaries

Report notes shift from individual cyber-crims to skilled adversaries

A new report from threat-intelligence experts Crowdstrike has highlighted the continuous shift from individual cyber-criminals and cyber-gangs to skilled adversaries such as governments and large organisations.

DayZed and confused: users' data purloined from zombie server

DayZed and confused: users' data purloined from zombie server

Users of the DayZ zombie shoot 'em up have been informed by the developer that their passwords and messages have been stolen by hackers.

PRODUCT REVIEWS

Attivo BOTsink

This is a high interaction honeypot on steroids.

CRU SCILock

This product – with its objective of defeating persistent malware – is a fit for active breach detection.

Fidelis XPS

There really is little, if anything, that XPS cannot do in the digital forensics detection, analysis, prevention and response arena.

Upcoming Webcasts

Opinions

Four key predictions for enterprise security in 2016

Four key predictions for enterprise security in 2016

The threats faced and intelligence needed in enterprise security is always changing and the organisations that stay on top of these trends will be best placed to handle whatever comes their way says Mark Hughes.

Secure Shell (SSH) the key to the post-password world

Secure Shell (SSH) the key to the post-password world

The humble password is often seen as obsolete and ineffective. David Howell suggests that Secure Shell (SSH) key technology has several key advantages and can help to deliver the post-password world.

Security in the age of network virtualisation

Security in the age of network virtualisation

Many enterprise CIOs are learning how Software Defined Networking (SDN) and Network Function Virtualisation (NFV) can bring about business transformation as well as IT efficiencies says Craig D'Abreo.

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US