Latest News

Leaky Bluetooth smartphones & wearables can be tracked from 100m away

Leaky Bluetooth smartphones & wearables can be tracked from 100m away

Researchers at Context Information Security have discovered that smartphones, tablets, iBeacons, fitness trackers and other wearable devices using embedded Bluetooth Low Energy (BLE) could potentially be tracked from 100m away.

Features

ICYMI: Tea-loving hackers, Venom flaw and overworked CISOs

ICYMI: Tea-loving hackers, Venom flaw and overworked CISOs

This week's ICYMI column looks at a tea shop data breach, analysis on the Venom flaw and concerns over 'burnt-out' security professionals.

ICYMI: WordPress XSS flaw, costly breaches & the return of Snooper's Charter

ICYMI: WordPress XSS flaw, costly breaches & the return of Snooper's Charter

The latest ICYMI column looks at the latest WordPress XSS flaw, costly data breaches and the return of the controversial "Snooper's Charter".

ICYMI: Lenovo MiTM bug, 'hero' Snowden & cyber-insurance trust

ICYMI: Lenovo MiTM bug, 'hero' Snowden & cyber-insurance trust

This week's In Case You Missed It (ICYMI) column looks at the latest Lenovo flaw, Edward Snowden's standing in the UK, trust in cyber-insurance and a new version of TorrentLocker.

Opinion

'The best defence is a good offence' in evolving security, networking market

'The best defence is a good offence' in evolving security, networking market

Dieter Lott discusses the security and networking solutions market and how organisations should be adopting a new proactive approach to security breaches given that IT infrastructure is in a constant state of change.

Teach children to hack ethically to save them from dark side

Teach children to hack ethically to save them from dark side

Teach children to code and, yes, even to hack so they learn about the power and potential perils of the internet, says Nick Banks.

Protecting your assets from the front lines

Protecting your assets from the front lines

Patrick Peterson examines why organisations need to focus on both external and internal assets to address the phishing threat.