FEATURED

ICYMI: Adult Friend Finder breach, Android woes & leaky Bluetooth

ICYMI: Adult Friend Finder breach, Android woes & leaky Bluetooth

This week's ICYMI looks at an embarrassing data breach at Adult Friend Finder, new problems with Android, and how you can track devices with Bluetooth Low Energy (BLE).

LATEST NEWS

Android apps vulnerable due to lack of standards

Android apps vulnerable due to lack of standards

The lack of standards for Android apps development is leaving users vulnerable according to a Trend Micro security specialist. The company has uncovered a vulnerability in the Apache Cordova framework that could force the app to crash.

Russian banks lose 3.5 billion Rubles to hackers

Russian banks lose 3.5 billion Rubles to hackers

Russian banks increasingly concerned at the activities of cyber-criminals taking advantage of dated operating systems.

Zeus and Conficker malware return to haunt UK companies

Zeus and Conficker malware return to haunt UK companies

Old malware variants, the Zeus Trojan and the Conficker computer worm, remain a huge problem for most UK companies, according to CERT-UK's first annual report.

PRODUCT REVIEWS

Gemalto SafeNet Authentication Service

starstarstarstar¾
SafeNet Authentication Service is a cloud-based authentication service that uses a wide range of tokens and custom agents to support multifactor authentication to include one-time passwords generated by a phone app, SMS, a hardware token or email.

Cyphercor LoginTC

starstarstarstar½
LoginTC from Cyphercor is a cloud-based solution that uses a mobile device or a desktop for authentication. It has easy-to-use iOS, Android and Chrome desktop applications to approve logins to a variety of products.

Imation IronKey F200 Flash Drive

starstarstarstarstar
The Imation IronKey F200 Flash Drive is a simple, easy to set up and extremely secure device for users who need to transport confidential data between computers.

Upcoming Webcasts

Opinions

Using HSMs to prevent RansomWeb attacks

Using HSMs to prevent RansomWeb attacks

Prevention and threat detection tools can only go so far, and should be used as part of a layered approach to data security, says Paul Hampton.

Unexpected obstacles on the road to maximising information value

Unexpected obstacles on the road to maximising information value

Despite the objective of releasing greater business value from information, most businesses prioritise locking it down, says Sue Trombley

Securing the contact centre from the inside out

Securing the contact centre from the inside out

Matthew Bryars, CEO of Aeriandi, analyses the threat of insider fraud and what contact centres can do to minimise risk

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US