This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Latest News

New TorrentLocker ransomware trades on fear of CryptoLocker

New TorrentLocker ransomware trades on fear of CryptoLocker

A new breed of ransomware called TorrentLocker that mimics more feared versions like CryptoLocker and CryptoWall has been discovered targeting users in Australia.

UK Ministry of Defence launches £2 million cyber defence competition

UK Ministry of Defence launches £2 million cyber defence competition

The British government has kicked-off a £2 million contest to find new ways to protect the Ministry of Defence (MoD) computer systems from cyber-attacks using automated threat response.

GCHQ tries to hack every server in 27 countries

GCHQ tries to hack every server in 27 countries

British spy agency GCHQ has been scanning every public-facing server in 27 countries for years to find any weak systems it can hack, according to the latest media reports.

UK cyber experts star in BBC 'house of hacking horrors' test

UK cyber experts star in BBC 'house of hacking horrors' test

Security experts from Sophos, NCC Group and Nettitude have taken centre stage in an experiment run by the BBC to find out how insecure smart home devices like TVs, fridges and webcams are.

Tesco tablets vulnerable to file recovery issues

Tesco tablets vulnerable to file recovery issues

Sensitive data stored on Android devices such as the Tesco Hudl can still be accessed even if a user has carried out a factory reset, the BBC has learned.

Features

The 5 most read articles this week: August 8 to 14

The 5 most read articles this week: August 8 to 14

Here are the five most popular articles, as read by you the reader, in the week for August 8 to 14.

ICYMI: Data breach disclosure, European privacy & internet outages

ICYMI: Data breach disclosure, European privacy & internet outages

This week's In Case You Missed It looks at data breach response, new concerns on EU privacy and claims that the internet is breaking 'under its own weight'.

Black Hat reports: Lurk Downloader & cryptocurrency mining hijacker

Black Hat reports: Lurk Downloader & cryptocurrency mining hijacker

During Black Hat Dell SecureWorks' threat reports included details on its research into the Lurk Downloader and hijacking attempts on large hosting companies' networks.

Opinion

Is your organisation ready for the next generation of millennials?

Is your organisation ready for the next generation of millennials?

A different attitude to privacy and security among many new workplace entrants is a potential risk that has to be managed says Chris Sullivan.

Why we need a tighter framework for social engineering penetration testing

Why we need a tighter framework for social engineering penetration testing

Protect against real-world threats and test the most likely scenarios using relevant models, including low-tech, says Gavin Watson.

A way forward in information sharing

A way forward in information sharing

Josh Goldfarb asks how can the infosec community move from informal and exclusive trust circles to more mature formal information sharing approaches, without losing agility and effectiveness.

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more