Marcell Gogan discusses the threat of privileged user access and how it often goes largely ignored
Annette Murphy explores how security professionals can prepare and protect their assets from Distributed Denial of Service (DDoS) attacks
Nearly half of UK organisations (47 percent) feel they have insufficient skills in-house to deal with the current cyber-threat landscape.
Internet of Things (IoT) devices running on the open-source Linux OS are under attack from NyaDrop.
Brazil has emerged as a primary centre of financially motivated e-crime threat activity.
Josh Corman, founder of I Am the Cavalry, spoke at IP EXPO Europe 2016 and pointed the finger at the software supply chain to tackle cyber-threats, arguing that we need fewer and better suppliers.
As data breaches become commonplace and organisations struggle to keep pace, Treavor Dearing explains why integration and collaboration among IT security vendors is emerging as the only viable solution to beat cyber-criminals once and for all.
The Swiss intelligence service received permission to begin tapping phones and monitoring emails following a vote in the nation's parliament and approval by a public referendum.
A majority of mobile users (89 percent) wouldn't know if their device has been infected through a cyber-attack, revealing a massive lack of awareness of cyber-threats.
An individual who self-identified as Guccifer 2.0 continues to deny reports by security firms that link the purported hacker or hacking group to Russian advanced persistent threat (APT) groups.
Bloggers using the WordPress platform are "strongly encouraged" to update their sites immediately to address persistent XSS issues.
Eight brands of IoT home routers were compromised and used to create botnets that launched an application-level DDoS attack against a website's multiple servers.
DDoS attacks have increased in frequency, scale and complexity over the past year, driven by DDoS-for-hire services.
US Senators asked Ted Cruz (R-TX) to hold a hearing that examines Donald Trump's Russia comments entreating Russia to "find the 30,000 emails that are missing."
A robust underground marketplace for the sale of stolen products from compromised accounts as well as shady online services has been detected in Russia.
François Amigorena explains why compromised credentials are a major cyber-threat to organisations and how cumbersome security wastes time, whereas contextual awareness allows greater security automatically.
An Israel-based security firm has issued a warning to fans of the upcoming Olympics to be wary of phony offers.
A cyber-scam has been unfolding in the wake of the Brexit vote.
Godless, an emerging mobile malware threat capable of rooting Android phones, has started to adopt the traits of an exploit kit, in that it searches for multiple vulnerabilities through which it can automatically infect a victim.
Conficker maintains its rank as the most common malware family, according to Check Point's May 2016 Threat Index.
Hackers used login information to launch a "sophisticated password attack" to login to Citrix's GoToMyPC user accounts, according to a company blog post.
At least 10,000 Australians have been targeted in a ransomware campaign that lures recipients with an email purportedly from local energy company AGL.
Researchers have discovered a malware-based APT dating back to 2008 that at least appears to target political enemies of Ukraine, including pro-Russia separatists in the disputed eastern region of the country.
North Korea denies claims by South Korea that it was behind a cyber-attack on a navy defence contractor.
Two Israeli men accused of securities fraud and hacks into media outlets and nine financial institutions, including JPMorgan Chase, Fidelity Investments and E*Trade Financial Corp., will be extradited to the US.
To face the growing number of cyber-threats as part of their efforts to get ready for the 4th industrial revolution, British manufacturers are being urged to step up their cyber-security planning.
Researchers found a series of malicious apps containing Android/Clicker.G on the Google Play store. The campaign targets mobile devices in Russia, but they affect apps that are available globally.
Mike Loginov and Viv MacDonald explore the importance of management awareness of cyber-security in an organisation
Mobile attacks can workaround two-factor authentication on Android phones and inject malware onto iOS phones.
Ransomware accounts for around a quarter of cyber-threats targeting internet users in the UK.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report
- Russian intelligence claims to bust up pending banking cyber-attack
- Presidential commission calls for collaborative action to combat cyber-threats
- Russia's banks will be hacked today, apparently
- Met Police grab suspect with phone unlocked to get hold of data
- Researchers hack Visa cards in six seconds