A site for classified advertising popular in the UK, Australia and South Africa was hit with a malvertising attack.
Mav Turner explains why threat hunting is a growing focus for IT security strategies.
Passwords have been reset for a number of Gyft users as a precaution after account data was reported for sale.
While Patch Tuesday is a well-known event for Microsoft and Adobe users, Apple product owners this week received a dose of reality when they found themselves on the receiving end of several security updates.
Pete Shoard asks how powerful are less developed countries such as North Korea when it comes to cyber-threats, and can it be regarded as a major player in cyber-warfare anyway for the impact it has achieved?
Thousands of websites have been compromised with malware code that ultimately redirects visitors to a landing page hosting the Nuclear Exploit Kit.
Russia and Israel have reached an agreement on the design of a package of measures aimed at more actively fighting cyber-terrorism and reducing cyber-threats.
In this latest ransomware expect advances in how they are delivered and how they take instructions from the command-and-control server
Gib Sorebo's RSA session, Managing the unmanageable: A risk model for the Internet of things, explains how the law of unintended consequences on the Internet will only get worse
As Robert Hinden, Check Point Fellow, described in his Wednesday RSA session, Protecting Critical Infrastructure, hacking physical infrastructure is something that can affect us all, and like IT systems, there are many vulnerabilities, but the consequences are much greater, and the attacks have begun.
The vulnerabilities exploited in most point-of-sale breaches are relatively simple, security experts discussed at RSA Conference 2015.
Panellists at RSA 2015 discussed cyber-espionage and intellectual property theft affecting companies and steps the private and public sector must take to curb the threat.
Data breaches, ransomware, and threats against industrial control system were were discussed during an RSA Conference 2015 session on dangerous attack techniques.
At RSA Conference in San Francisco, Intel Security Group SVP and General Manager Christopher Young challenged the industry to write its own Moneyball story.
The responses of global practitioners were compared with Global 1000 security execs, which provided a best practices benchmark.
The ISC website was quickly taken down after researchers with Cyphort Labs identified that the main page was ultimately redirecting visitors to the Angler Exploit Kit.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Microsoft update left Azure Linux virtual machines open to hacking
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry