ICYMI: TeamViewer control; Intel defence; Card cloner; Skype a vector; Cloud apps not GDPR ready

ICYMI: TeamViewer control; Intel defence; Card cloner; Skype a vector; Cloud apps not GDPR ready

The latest In Case You Missed It (ICYMI) looks at TeamViewer hijack; Intel's processor defence; 15 per sec cards cloned; Malware via Skype; Cloud apps not GDPR ready

ICYMI: SC Awards; Lenova flaw; TeamViewer flaw?; ransomware rise

ICYMI: SC Awards; Lenova flaw; TeamViewer flaw?; ransomware rise

The latest In Case You Missed It (ICYMI) looks at SC Awards winners; Flawed app in Lenova; TeamViewer potential flaw; ex-staff with access; ransomware rise continues.

ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack

ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack

The latest In Case You Missed It (ICYMI) looks at CEO whaling victim; Unpatched zero-day; Passwords dropped; Self-propagating ransomware; USB charging hack

ICYMI: WhatsApp trap; Cerber RaaS; LinkedIn loss; Screen lock; 2 yrs to GDPR

ICYMI: WhatsApp trap; Cerber RaaS; LinkedIn loss; Screen lock; 2 yrs to GDPR

The latest In Case You Missed It (ICYMI) looks at WhatsApp malware; Cerber Ransomware; LinkedIn loses 117m credentials; Screen lock scammers; GDPR countdown. Note: UK Holiday 30 May.

ICYMI: Buffer overflow; AI crime-fighter; Banking Trojan; SS7 Flaws; PayPal Phishing

ICYMI: Buffer overflow; AI crime-fighter; Banking Trojan; SS7 Flaws; PayPal Phishing

The latest In Case You Missed It (ICYMI) looks at Symantec vulnerability; AI crime-fighter; Banking under threat; Flaws in SS7; PayPal phishing scam

ICYMI: AV halts op; Locky duped; HIV leak; Greek DdoS; Phishers strike

ICYMI: AV halts op; Locky duped; HIV leak; Greek DdoS; Phishers strike

The latest In Case You Missed It (ICYMI) looks at AV halts op; Locky loses out; HIV leak fine; Bank of Greece DDoSed; Investment firm spearphished.

ICYMI: Facebook flaw; Verizon report; 5 Cisco alerts; TalkTalk arrest; Crime up

ICYMI: Facebook flaw; Verizon report; 5 Cisco alerts; TalkTalk arrest; Crime up

The latest In Case You Missed It (ICYMI) looks at Facebook backdoor; Verizon findings; Cisco vulnerabilities; 6th TalkTalk arrest; cyber-crime rampant

ICYMI: Buffalo stampede; Airport attack?; Ransomware plus; Patching halted; Short URLs

ICYMI: Buffalo stampede; Airport attack?; Ransomware plus; Patching halted; Short URLs

The latest In Case You Missed It (ICYMI) looks at Malware targeting malware; Was airport attacked?; Ransomware, malvertising & phishing; Quicktime unfixed; Short urls a risk

ID & access: Halt, who goes there?

ID & access: Halt, who goes there?

Evolving ID and access management options have gone from central control of a rigid boundary to multiple ID options, distributed assets, IoT machine ID and variable authentication reports Danny Bradbury*

Is Privacy at Risk?

Is Privacy at Risk?

Privacy is dependent on security while security is dependent on confidentiality, a special case of privacy. This is as true today, in the information age, as it has always been, and we can hardly consider one without the other, writes Tom Reeve

Encryption delivers quantum of solace

Encryption delivers quantum of solace

Data creation and transmission is growing exponentially, with 2.8 zettabytes of data created in 2012, forecast to reach 40 zettabytes (ZB) by 2020 (IDC), and currently encryption offers the best option to secure all that data says Roi Perez

Using big data to uncover Deviant Behaviour

Using big data to uncover Deviant Behaviour

Cyber-attacks are getting larger, faster and more diverse, making them increasingly complex to identify and mitigate. But at the same time, as Kate O'Flaherty reports, businesses are collecting vast amounts of security data - far too much for a human to analyse and turn into something useful

Domestic spying internationally: Three years after Snowden

Domestic spying internationally: Three years after Snowden

Nearly three years on and the world still finds itself tackling the consequences of the Snowden disclosures reports Max Metzger

2 Minutes On: DROWNing in SSL2 connection requests - the web's latest large-scale vulnerability

2 Minutes On: DROWNing in SSL2 connection requests - the web's latest large-scale vulnerability

One of the latest large scale web vulnerabilities, dubbed DROWN (Decrypting RSA with Obsolete and Weakened Encryption), again targets SSL.

Movers & Makers: Spring 2016

Movers & Makers: Spring 2016

Recent updates on the people and organisations that make up the information security industry

ICYMI: Morrisons breach; Worldpay card data; power attack losses; Russian EU targets; criminal capability

ICYMI: Morrisons breach; Worldpay card data; power attack losses; Russian EU targets; criminal capability

The latest In Case You Missed It (ICYMI) looks at Morrisons lawsuit; Wordpay vulnerabilities; Critical scenario costs; EU Banks targeted; Cyber-crime capabilities.

ICYMI: Panama leak; Ethical Top 15; What'sApp encryption; door hack

ICYMI: Panama leak; Ethical Top 15; What'sApp encryption; door hack

The latest In Case You Missed It (ICYMI) looks at Panamanian papers - insider or email hack? Top 15 ethical hackers; WhatsApp end-to-end encryption; door control vulnerability

ICYMI: Snapchat hack; TLS Drowned; Medical ransomware; Norway/China; SSL VPN insecure

ICYMI: Snapchat hack; TLS Drowned; Medical ransomware; Norway/China; SSL VPN insecure

The latest In Case You Missed It (ICYMI) looks at Snapchat whaled; Drown hits TLS; Hospitals ransomed; Chinese espionage in Norway; 90% of SSL VPNs insecure

ICYMI: Russian bank attack; UK CISO?; banks suspended; Crypto hack, hospital ransom

ICYMI: Russian bank attack; UK CISO?; banks suspended; Crypto hack, hospital ransom

The latest In Case You Missed It (ICYMI) looks at Rusian bank attack thwarted; need for UK CISO?; banks hack themselves; Cypto key hack; US hospital ransomed.

Predictions: 2016 and beyond

Predictions: 2016 and beyond

Industry predictions for cyber-security are unlikely to achieve a consensus, but they do provide plenty of insights and recurring themes that serve as indicators of future trends, as the following edited forecasts reported by Tony Morbin demonstrate

Silver linings while clouds gather

Silver linings while clouds gather

There's no denying that cloud adoption is growing at a tremendous pace, along with a subsequent expansion of the threat landscape. Keeping mountains of data from numerous organisations on a third-party's servers might be a scary prospect for the security minded. But, Max Metzger asks, should we be worried?

Do your data policies stand up to scrutiny?

Do your data policies stand up to scrutiny?

Most companies are not ready or able to comply with the proposed new Data Protection Regulations, reports Roi Perez, while ignoring them is not an option given the prospect of heavy fines of up to €20 million

Securing data wherever it may be

Securing data wherever it may be

Data now resides on multiple devices in many locations. But, Kate O'Flaherty asks, is it out of control?

ICYMI: OS X most vulnerable? Bank SSL use; GDPR agreed; Dutch damn backdoors; Baltic security boost

ICYMI: OS X most vulnerable? Bank SSL use; GDPR agreed; Dutch damn backdoors; Baltic security boost

The latest In Case You Missed It (ICYMI) looks at Apple OS X vulnerability ranking; Banks still using SSL; GDPR agreed; Dutch oppose encryption backoors; Baltics boost national IT security

ICYMI: Madison extortion, Cyber-sec challenge, United bug-bounty, French intelligence, and Anonymous/ISIS spat

ICYMI: Madison extortion, Cyber-sec challenge, United bug-bounty, French intelligence, and Anonymous/ISIS spat

The latest In Case You Missed It (ICYMI) looks at suspected Madison extorortionists, Cyber-Sec challenge finals, bug-bounty criticism, French intelligence & Anonymous' ISIS twitter battle.

ICYMI: Ashley Madison; TalkTalk; Contactless theft; Experian hack; Marks & Spencer

ICYMI: Ashley Madison; TalkTalk; Contactless theft; Experian hack; Marks & Spencer

The latest In Case You Missed It (ICYMI) looks at possible Ashley Madison extortion campaign, analysing the TalkTalk attack, contactless card theft, opinion on the Experian hack and Marks & Spencer not a hack.

ICYMI: Yahoo passwords; Japanese airports; French Cyber-sec; Contactless theft; Dridex back

ICYMI: Yahoo passwords; Japanese airports; French Cyber-sec; Contactless theft; Dridex back

The latest In Case You Missed It (ICYMI) looks at Yahoo scraping passwords; Japanese airports hack; French CyberSec policy; SC in contactless theft; Dridex back

ICYMI: Aviation risk; netgear patch delay; legal threats; android malware variants; SSL weakness

ICYMI: Aviation risk; netgear patch delay; legal threats; android malware variants; SSL weakness

This week's In Case You Missed It (ICYMI): Aviation risk warning; netgear patch delay; vulnerability disclosure -legal threats; android SMS malware variants; SSL weakness exploited for phishing.

Extortion on the cards

Extortion on the cards

Ransomware is an attack unlike any other. Chances are you know about it pretty quickly after you've been infected but there is little you can do once you've been hit if you aren't prepared. Tom Reeve reports

Cyber-crime on the corporate agenda

Cyber-crime on the corporate agenda

Constant innovation by hackers is seeing a surge in attacks. The onus now falls on the industry, government and law enforcement to try and find a solution, reports Kate O'Flaherty

Banking on defence to beat the bad guys

Banking on defence to beat the bad guys

Banks and financial services are the number one target for hackers and nation-states, but as Doug Drinkwater reports, the industry is fighting to stay ahead of the threats with new tools, training, and increasing collaboration

City beat goes global

City beat goes global

Adrian Leppard, commissioner of the City of London Police, explains to SC's Tony Morbin that crime prevention's mission in cyber-fraud is to help industry protect its information assets - but that international crime and encryption remain major challenges for law enforcement

ICYMI: hospital in email breach; crashing Chrome; Symantec purges; ICO more free; Apple apps snapped

ICYMI: hospital in email breach; crashing Chrome; Symantec purges; ICO more free; Apple apps snapped

In this week's In Case You Missed It (ICYMI): NHS hospital email breached; crash Google Chrome in 16 chars; Symantec dismisses staff over certs; ICO moved from MOJ to Culture; Apple apps infected with malware.

ICYMI: GCHQ Password advice; Jihadi cabinet attack; Dridex hits UK; MS Irish data; ATM malware

ICYMI: GCHQ Password advice; Jihadi cabinet attack; Dridex hits UK; MS Irish data; ATM malware

In this week's In Case You Missed It (ICYMI): GCHQ advises on passwords; Jihadi cabinet attack 'avoidable'; CERT UK aids Dridex targets; Data jurisdiction dispute; Multi-vendor ATM malware

ICYMI: Masterful Shifu, wake-up call, KeyRaiders, pre-empt EU and scanning Android apps

ICYMI: Masterful Shifu, wake-up call, KeyRaiders, pre-empt EU and scanning Android apps

In this week's In Case You Missed It (ICYMI): IBM warning over masterful Shifu, Carphone Warehouse attack was a wake-up call, KeyRaider targets jailbroken iPhones, pre-empt the EU and safeguard data now, and thousands of vulnerable Android apps found with new scanner.

ICYMI: Adblock threatens OSX; Thomson customers exposed; AM leaker 'a woman'; AM police call on white hat help; Malaysia cyber alert

ICYMI: Adblock threatens OSX; Thomson customers exposed; AM leaker 'a woman'; AM police call on white hat help; Malaysia cyber alert

In this week's In Case You Missed It (ICYMI): Adblock Plus weakens Mac OSX ? Thomson breach exposes hundreds; Madison insider a woman says McAfee - police call for 'white hat' help; Cyber-attack alert in Malaysia.

ICYMI: Big data leaking; Salesforce vulnerability; suppressed car hack; sound authentication and critical IE fix

ICYMI: Big data leaking; Salesforce vulnerability; suppressed car hack; sound authentication and critical IE fix

In this week's In Case You Missed It (ICYMI): Big data leaking; Salesforce vulnerability patched; suppressed car hack; ambient sound authentication and critical IE fix.

Sound Proof: new two-factor authentication through ambient noise

Sound Proof: new two-factor authentication through ambient noise

Second authentication tier is proximity of user's phone to login device

ICYMI: Apple hack; Carphone Warehouse breach; Firefox patch; Russian self-sufficiency

ICYMI: Apple hack; Carphone Warehouse breach; Firefox patch; Russian self-sufficiency

The latest ICYMI column looks at the biggest stories on SC this week, including non-jailbroken Apple hack; carphone Warehouse breach; Firefox patch and more.

ICYMI: Windows 10 hack, Bank attacks and slow DDoS

ICYMI: Windows 10 hack, Bank attacks and slow DDoS

This week's 'In Case You Missed It' column looks at the five most-read articles on SC this week, from hacking of Windows 10 and exploits on patched Macs to bank attacks and DDoS.

ICYMI: Tor rivals, Windows 10 and the cost of an APT

ICYMI: Tor rivals, Windows 10 and the cost of an APT

The latest ICYMI column looks at the biggest stories on SC this week, including a 'faster Tor', the security implications of Windows 10 and the actual cost of a real APT.

ICYMI: Visa applications exposed, government backdoors & the Ashley Madison hack

ICYMI: Visa applications exposed, government backdoors & the Ashley Madison hack

This week's ICYMI column looks at the most-read stories on SC this week, including our investigation on VFS Global, the UK government's attitude towards encryption and the continuing fall-out from the Ashley Madison hack.

ICYMI: 'Sophisticated' ransomware, RIP Flash & hacking Tour de France

ICYMI: 'Sophisticated' ransomware, RIP Flash & hacking Tour de France

This week's 'In Case You Missed It' column looks at the five most-read articles on SC this week, from the intricacies of ransomware and the supposed death of Adobe Flash to hacking a professional cycling team.

ICYMI: Tor sniffing, router bugs and Hacking Team fallout

ICYMI: Tor sniffing, router bugs and Hacking Team fallout

This week's ICYMI column looks at Tor sniffing, old-school router attacks and the fallout from the Hacking Team data breach.

ICYMI: Quantum encryption; FBI ransomware alerts; Ipv6 VPN services; Android mobiles; Ransomware

ICYMI: Quantum encryption; FBI ransomware alerts; Ipv6 VPN services; Android mobiles; Ransomware

This week's In Case You Missed It looks at Toshiba's 'unbreakable' quantum encryption; FBI Ransomware alerts; VPN IPv6 vulnerability; 97% of malicious mobile malware targets Android; 1/3 UK companies hit by ransomware.

SC Magazine Awards 2015 Europe

SC Magazine Awards 2015 Europe

Winners of the SC Magazine Awards in Europe

Email encryption improves security

Email encryption improves security

"We have seen real benefits throughout the organisation as a result of our usage of Switch," says Sarah Roberts, head of ICT at NWFRS

Women in security: Is the tide turning?

Women in security: Is the tide turning?

The lack of women in information security is a constant topic of conversation and debate but, as Doug Drinkwater reports, changes are afoot

What's wrong with CBEST?

What's wrong with CBEST?

CBEST has its critics - and defenders - as the industry grapples with how best to ensure critical infrastructure deploys best practice, as Tom Reeve reports

A Critical Threat

A Critical Threat

Attacks on critical national infrastructure are a growing concern, not just the banking and civil infrastructure, but also control systems used in the physical delivery of services. This is set to become even more of a problem as SCADA systems become internet enabled, reports Kate O'Flaherty

Security on the agenda

Security on the agenda

Cyber-security has become a boardroom issue, but too few boards give the topic the time or resources required, our experts agreed at a recent SC Magazine Roundtable. Opinions were split over how to respond

ICYMI: Polish airlines, Samsung, VoIP, LinkedIn bounty, Verify limitations

ICYMI: Polish airlines, Samsung, VoIP, LinkedIn bounty, Verify limitations

ICYMI: Lot airline DDoS attack; Samsung keyboard vulnerability, poor VoIP server security; LinkedIn bug bounty programme, Verify programme has severe privacy/security problems.

In Case You Missed It: German government and renewable power sector breaches, new regs due, and VoIP attacks rise

In Case You Missed It: German government and renewable power sector breaches, new regs due, and VoIP attacks rise

This week's In Case You Missed It looks at major German government breach, turbines attacked, nuclear talks targeted, EU Data law looms larger and finally VoIP due an upgrade.

ICYMI: Phishing in the Yemen, Google privacy & women in security

ICYMI: Phishing in the Yemen, Google privacy & women in security

This week's In Case You Missed It looks at Yemen's cyber-army, Google's latest efforts with online privacy and finally some good news for women in security.

ICYMI: Crypto wars, SC award winners and hacking North Korea

ICYMI: Crypto wars, SC award winners and hacking North Korea

The latest In Case You Missed It (ICYMI) looks at concerns over new UK law, the full list of SC Award winners and how the US tried and failed to hack North Korea.

SC Awards Europe 2015 winners announced

SC Awards Europe 2015 winners announced

Congratulations to all the winners at the SC Awards Europe 2015 announced last night - full list of winners published.

ICYMI: Tea-loving hackers, Venom flaw and overworked CISOs

ICYMI: Tea-loving hackers, Venom flaw and overworked CISOs

This week's ICYMI column looks at a tea shop data breach, analysis on the Venom flaw and concerns over 'burnt-out' security professionals.

ICYMI: WordPress XSS flaw, costly breaches & the return of Snooper's Charter

ICYMI: WordPress XSS flaw, costly breaches & the return of Snooper's Charter

The latest ICYMI column looks at the latest WordPress XSS flaw, costly data breaches and the return of the controversial "Snooper's Charter".

ICYMI: Lenovo MiTM bug, 'hero' Snowden & cyber-insurance trust

ICYMI: Lenovo MiTM bug, 'hero' Snowden & cyber-insurance trust

This week's In Case You Missed It (ICYMI) column looks at the latest Lenovo flaw, Edward Snowden's standing in the UK, trust in cyber-insurance and a new version of TorrentLocker.

ICYMI: Barclays beefs up security, AVs vulnerable to Freak & getting InfoSec right

ICYMI: Barclays beefs up security, AVs vulnerable to Freak & getting InfoSec right

The top stories on SC over the last week include Barclays poaching staff from Europol, anti-virus concerns and some useful advice for getting information security right.

Delivering digital services: SC Roundtable report

Delivering digital services: SC Roundtable report

The public sector is being asked to deliver its services digitally, with availability and reliability just as important as security, as our experts agreed at a recent SC Magazine Roundtable

Infosec Europe 2015 preview

Infosec Europe 2015 preview

Now in its 20th year, the event's theme is "Intelligent Security: Protect. Detect. Respond. Recover."

SC Magazine UK's salary survey: how much are you worth?

SC Magazine UK's salary survey: how much are you worth?

SC Magazine's salary survey shows that in response to the current skills shortages, the money is rolling in for information security professionals.

Defence from denial of service

Defence from denial of service

Kate O'Flaherty reports how distributed denial of service attacks are growing in size and scale, making it important to know what to do before, during and after an attack

With a little help from my friends

With a little help from my friends

Rapid expansion of the cyber-security sector has meant that government agencies and international professional organisations don't meet all of the industry's changing demands and it has often had to provide its own support infrastructure

ICYMI: SSL and Magento flaws, APT gangs & the breach blame game

ICYMI: SSL and Magento flaws, APT gangs & the breach blame game

This week's ICYMI column looks at the top stories on SC from the last week, from the breach blame game and Anonymous hackers to the discovery and patching of critical SSL and Magento flaws.

ICYMI: Anonymous targets ISIS, 'advanced' attacks & TV takeover

ICYMI: Anonymous targets ISIS, 'advanced' attacks & TV takeover

This week's In Case You Missed It column looks the top stories on SC from the past week, including an online battle between Anonymous and ISIS, a takeover of a French TV network and demystifying claims of 'advanced' cyber-attacks.

ICYMI: Thieving Chrome, 'illegal' Facebook & police fighting tech firms

ICYMI: Thieving Chrome, 'illegal' Facebook & police fighting tech firms

The latest ICYMI looks at data-scraping Chrome extensions, Facebook privacy and common cyber-security failings.

ICYMI: OpenSSL bugs, stealthy DoS attacks and stealing Bitcoins

ICYMI: OpenSSL bugs, stealthy DoS attacks and stealing Bitcoins

In this latest In Case You Missed It column, we look at the top stories on SC this week, including the discovery of a new OpenSSL bug and super-stealthy denial of service attack.

Firewalls 20 years on: Gil Shwed interview

Firewalls 20 years on: Gil Shwed interview

Mobiles and the cloud may have subverted the idea of perimeter protection, but some 20 years after launching FireWall-1, Check Point founder Gil Shwed tells SC that there's still a security role for the Firewall.

ICYMI: Freak flaws, 'smart' city questions and UK data breaches

ICYMI: Freak flaws, 'smart' city questions and UK data breaches

This week's In Case You Missed It column looks at the top five articles on SC this week, including new Facebook flaws, 'Freak' attacks and the trade-offs with 'smart' cities.

ICYMI: Facebook hijack, Rowhammer bug and Star Trek CISOs

ICYMI: Facebook hijack, Rowhammer bug and Star Trek CISOs

This week's ICYMI column looks at the top five stories on SC this week, including a Facebook log-in hijacking tool, the Rowhammer flaw and the future of the CISO.

Bristol launches 'smart' city amid privacy doubts

Bristol launches 'smart' city amid privacy doubts

Bristol has launched a 'smart cities' project that will see a software-defined network facilitate machine-to-machine learning for a future of driverless cars, assisted living and real-time healthcare. But where does that leave citizens' privacy?

Case study: Securing the water supply

Case study: Securing the water supply

"IT security isn't just about technology, it's also people and processes," explains Michael Cock, group information technology manager at Sutton and East Surrey Water (SESW) as he describes to SC some of the policies, approaches and technology used to protect the drinking water of 670,000 residents and 284,000 properties

How do you solve a problem like mobile security?

How do you solve a problem like mobile security?

A growing variety of technologies, functionality and devices, often not chosen by the organisation, connecting to the corporate network from beyond the perimeter make mobile security tougher than ever, reports Doug Drinkwater from SC Magazine's recent roundtable

Fixing the UK's cyber-skills gap

Fixing the UK's cyber-skills gap

A KPMG survey found that over half of UK companies would seriously consider hiring ex-hackers or convicted criminals to plug their skills gap

NATO: Defending against the known unknowns

NATO: Defending against the known unknowns

Pooling of technology and people across agencies and member countries - as well as partnering with industry - is central to NATO's cyber-defence strategy, as Ian West explains to SC's Tony Morbin

Hackers for hire

Hackers for hire

Advances in technology and declining prices are fuelling an expanding market in hiring hackers - in some cases for defence, but increasingly, for criminal activities.

ICYMI: Gov spies grab crypto keys, Masque attacks & interviewing Eugene

ICYMI: Gov spies grab crypto keys, Masque attacks & interviewing Eugene

The latest In Case You Missed It column looks at the biggest stories on SC this week, including the alleged NSA/GCHQ hack on Gemalto and our interview with Eugene Kaspersky.

Eugene Kaspersky interview: 'Critical infrastructure is under threat'

Eugene Kaspersky interview: 'Critical infrastructure is under threat'

It's been a busy few weeks for Kaspersky Lab, the anti-virus vendor behind the discovery of Equation and Carbanak groups. SC interviewed CEO Eugene Kaspersky on the disclosures, the company's direction, anti-virus and cyber-insurance.

ICYMI: UK data breaches, Carbanak and Royal Navy threats

ICYMI: UK data breaches, Carbanak and Royal Navy threats

This week's ICYMI looks at the top stories on SC this week, including new reports on UK data breaches and the Carabanak cyber-crime gang.

Largest bank heist ever conducted online?

Largest bank heist ever conducted online?

The multi-facited Carbanak cyber-raid on global financial institutions appears to be the biggest ever bank robbery by a single cyber-crime group.

ICYMI: iOS spyware, car vulnerabilities and Outlook privacy

ICYMI: iOS spyware, car vulnerabilities and Outlook privacy

This week's ICYMI column reviews the top stories on SC last week, from an espionage group targeting Apple iOS devices to Internet of Things flaws and privacy concerns around Outlook.

Same old Target: How retailers get hacked

Same old Target: How retailers get hacked

The retail industry is a common target for hackers, mainly because that's where the money is. But as Sophos security expert James Lyne demonstrates, their defences are all too often easily exploitable.

ICYMI: EU data protection laws, Skype hackers and the return of Pirate Bay

ICYMI: EU data protection laws, Skype hackers and the return of Pirate Bay

In its week's ICYMI, we look at the top news articles on SC the last week including EU data protection laws, Skype hackers and the re-launch of Pirate Bay.

ICYMI: EU data protection, iPhone spyware and Flash zero-days

ICYMI: EU data protection, iPhone spyware and Flash zero-days

The latest ICYMI column looks at the biggest stories on SC this week, including worrying news on EU data protection laws, claims of iPhone spyware and new Flash Player zero-days.

ICYMI: Hacking into cars, Chinese cyber-espionage and Siri's security flaw

ICYMI: Hacking into cars, Chinese cyber-espionage and Siri's security flaw

The latest ICYMI column looks at the week's biggest stories, including hacking into cars, Chinese cyber-espionage and the take-down of thousands of French websites.

CISOs: Out of step with their own security teams?

CISOs: Out of step with their own security teams?

CISOs are increasingly taking on greater management responsibilities - but are they as a result being divorced from their firm's true security maturity and the tools needed to avoid being breached?

ICYMI: A fond farewell to a security legend

ICYMI: A fond farewell to a security legend

This week's In Case You Missed It looks at the five biggest security news this week, including the sad passing of information security journalist - who helped found SC - Steve Gold.

ICYMI: Lizard Squad arrest, yearly predictions and new iCloud flaw

ICYMI: Lizard Squad arrest, yearly predictions and new iCloud flaw

This week's In Case You Missed It looks at the five most popular articles on SC, including news on Lizard Squad and old security predictions.

The perimeter's breached - encrypt everything!

The perimeter's breached - encrypt everything!

Late last year SC Magazine UK editor-in-chief Tony Morbin interviewed Alan Kessler, president and CEO, Vormetric, to get an industry insider view on issues in the commercial encryption market.

Keys to the internet

Keys to the internet

International uptake has been slow for the DNS security extension (DNSSEC) which authenticates URL queries. Tony Morbin spoke to Anne-Marie Eklund Löwinder to get a better understanding of the issues

Securing the Internet of Things

Securing the Internet of Things

Multiple connected 'Internet of Things' devices could be fuelling a corporate security nightmare suggests Kate O'Flaherty

Russia revamps its infosec strategy

Russia revamps its infosec strategy

Cyber-crime is as much a threat to ordinary Russians as anyone else, and the country is developing a strategy to cope - while seeking international cooperation too, as Eugene Gerden in St Petersburg reports

Discussing APT: an SC Magazine UK editorial roundtable

Discussing APT: an SC Magazine UK editorial roundtable

Tapping the insight of info security's thought leaders on advanced persistent threats, what they represent and how to protect against them.

APT attacks: Time to respond

APT attacks: Time to respond

Advanced persistent threat (APT) attacks are complex, multi-layered and designed to evade detection, leaving IT security teams in the dark and sensitive data at risk. Doug Drinkwater asks how to respond

Reboot 25: Threat seekers

These explorers' findings of critical vulnerabilities - from Heartbleed to Shellshock - have generated excitement, along with awareness, and made an indelible mark on security.

Reboot 25: The influencers

Blessed are the influencers for they will make a true difference - through policy, vision, drive, innovation and ideas - in the course of information security. What sets our selection apart is that they've held significant sway on the direction of IT security.

Reboot 25: Thought leaders

These professionals have done everything from cryptography to founding an influential security conference.

Reboot 25: Industry pioneers

The following hitched up their digital wagons to blaze new trails in cybersecurity.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US