Information Security Research

China launches first quantum satellite for "hack-proof" quantum comms

By

China launched an orbital carrier rocket early Tuesday morning carrying the 'Micius' satellite, believed to be the world's first quantum satellite.

Incomplete version of 'Hitler-Ransonware' discovered

By

AVG malware analyst Jakub Kroustek discovered an unfinished version of a new strain of ransomware, dubbed Hitler-Ransomware.

Public opinion split on whether hacktivists have legit place in society

By

Global citizens are collectively torn as to whether or not hacktivists constitute a public nuisance, or actually benefit society, according to a new survey.

Survey finds enterprises moving toward hybrid cloud model

By

A survey charting the priorities of information security professionals found a shift in enterprise companies' approach to private and public cloud infrastructure.

Nest, other IoT devices, sent user info in the clear

Nest, other IoT devices, sent user info in the clear

By

Researchers at Princeton University's Center for Information Technology Policy (CITP) found security vulnerabilities in many of the most popular IoT devices that they looked at, including Google's Nest Thermostat.

Researchers discover morphed RATs capable of DDoS, phone log manipulation

Researchers discover morphed RATs capable of DDoS, phone log manipulation

As quickly as researchers discover ways to remove and block Remote Access Trojans used for spying on mobile devices and computers, hackers are creating new spyware strains from previously discovered malware - and they are developing more advanced capabilities than the original malware.

Cyber-security assurance earns "C" grade in new study

Cyber-security assurance earns "C" grade in new study

By

A new study investigating how IT security professionals assess and mitigate cyber-security risks showed much room for improvement.

Patched Flash bug still vulnerable

By

A bypass in the multimedia and software platform Flash, which Adobe said it patched in its last security update, has reappeared.

Outsourcing IT security continues to grow, study finds

Outsourcing IT security continues to grow, study finds

By

Spending on the outsourcing of IT functions is rising, according to a new report from Computer Economics.

Credit card style e-voting system could beat electoral fraud

Credit card style e-voting system could beat electoral fraud

With online voting in the UK yet to reach its full potential for the forthcoming election, many still doubt the security of systems claiming to be robust enough for a full, nationwide online vote.

SC Magazine UK's salary survey: how much are you worth?

SC Magazine UK's salary survey: how much are you worth?

By

SC Magazine's salary survey shows that in response to the current skills shortages, the money is rolling in for information security professionals.

Breach readiness survey shows most stray from IRP best practices

Breach readiness survey shows most stray from IRP best practices

The responses of global practitioners were compared with Global 1000 security execs, which provided a best practices benchmark.

Fixing the UK's cyber-skills gap

Fixing the UK's cyber-skills gap

A KPMG survey found that over half of UK companies would seriously consider hiring ex-hackers or convicted criminals to plug their skills gap

BadUSB malware could be used to infect ICSs

BadUSB malware could be used to infect ICSs

By

BadUSB malware could be used to manipulate industrial systems, says one security researcher.

Lies, damned lies and statistics

Lies, damned lies and statistics

Cyber-crime figures are a dime or dozen but are they really improving your security, asks Ken Munro.

Quantum physics behind 'unhackable' security authentication

Quantum physics behind 'unhackable' security authentication

By

A team of Dutch scientists is proposing a new security system for credit cards and passports which uses the power of quantum physics - and which is apparently 'impossible to hack'.

Are anti-malware solutions good enough?

Are anti-malware solutions good enough?

By

A new study reveals that anti-malware solutions are not as good as first thought, with most unable to detect new 'in the wild' malware. But some of the vendors in question have hit back.

ICYMI: Cyber-terrorism and politics, former hackers & supply chain problems

ICYMI: Cyber-terrorism and politics, former hackers & supply chain problems

By

This week's In Case You Missed It looks at the latest cyber-terrorism claims, former hackers in enterprises and issues to be dealt with in the supply chain.

Research reveals hackers are increasingly exploiting privileged accounts

Research reveals hackers are increasingly exploiting privileged accounts

By

New research claims that the security threats landscape is now almost egalitarian in nature, with almost every industry - and every company - now being a security target.

87% of top Apple iOS apps have been cracked

87% of top Apple iOS apps have been cracked

By

Attacks on Apple iOS devices are rising sharply, with 87 percent of the top 100 paid-for iOS apps now having been cracked and cloned - up from just 53 percent in 2013, according to a new report.

SC Webcasts UK

Sign up to our newsletters

FOLLOW US