FEATURED

ICYMI: Quantum encryption; FBI ransomware alerts; Ipv6 VPN services; Android mobiles; Ransomware

ICYMI: Quantum encryption; FBI ransomware alerts; Ipv6 VPN services; Android mobiles; Ransomware

This week's In Case You Missed It looks at Toshiba's 'unbreakable' quantum encryption; FBI Ransomware alerts; VPN IPv6 vulnerability; 97% of malicious mobile malware targets Android; 1/3 UK companies hit by ransomware.

LATEST NEWS

FBI offers $4.2m in bounties to catch cybercriminals

FBI offers $4.2m in bounties to catch cybercriminals

First prize goes to whoever can locate Gameover Zeus instigator, Evgeniy Mikhailovich Bogachev, worth a £2 million reward from the FBI.

Plex video sharing customers left at risk after hack attack

Plex video sharing customers left at risk after hack attack

Users of the video-sharing site Plex have been left vulnerable to an attack after the company revealed that members' passwords had been compromised.

Leaked document reveals internal Bitstamp Bitcoin raid investigation

Leaked document reveals internal Bitstamp Bitcoin raid investigation

A confidential leaked document from Bitstamp details how the Bitcoin trader was hacked and how the crime has been investigated.

PRODUCT REVIEWS

Boldon James Classifier v3.7

starstarstarstar½
The Boldon James Classifier bundle is a comprehensive data leakage prevention solution that is easy to implement in organisations large and small.

TITUS Classification Suite

starstarstarstarstar
TITUS Classification Suite approaches data classification in a unique way: By giving power back to the user while double-checking with automated analysis.

Code Green Networks TrueDLP

starstarstarstar½
Code Green Network's TrueDLP product is an extremely effective solution to data leak protection.

Upcoming Webcasts

Opinions

Macro malware epidemic returns

Macro malware epidemic returns

The return of a decade-old attack vector, the malicious macro, requires a granular, policy-based approach to managing email at the gateway, says Greg Sim.

Security considerations when taking iPad POS mainstream

Security considerations when taking iPad POS mainstream

Businesses of all sizes have begun to consider iPad POS as a viable option, but what are the security implications, asks Josh Smith.

Last Word: Cyber-blackout - The dangers within and without the grid

Last Word: Cyber-blackout - The dangers within and without the grid

Utilities face thousands of cyber-attacks every day, but we are not prepared for a successful take-down despite the very real threat says Oliver Eckel

Director's Cut

SC Webcasts UK

Sign up to our newsletters

FOLLOW US