Network Security

90% of ITDMs believe IAM is crucial to digital transformation success

90% of ITDMs believe IAM is crucial to digital transformation success

By

Most companies (90 percent) agree that identity and access management (IAM) is important to their company's digital transformation success.

Banking malware allows bad guys to lock, reset phone passwords

Banking malware allows bad guys to lock, reset phone passwords

By

Cyber-criminals have updated a two-year old banking app scam that grabs control of a victim's smartphone, locks them out and then drains their bank account while the person struggles to regain control of their device.

42% of global IT admins say security is a top cost to access legacy data

42% of global IT admins say security is a top cost to access legacy data

By

A third of companies are not clear on what specific information is archived and stored in their tape storage, posing risk and high cost to their business.

Firefox zero day impacts Tor

Firefox zero day impacts Tor

By

A Tor executive has confirmed that a zero-day vulnerability impacting Tor and Firefox has been spotted being used to execute malicious code, but it has been reported to Mozilla, according to ARS Technica.

Updated: A million German routers knocked offline by failed Mirai botnet attack

Updated: A million German routers knocked offline by failed Mirai botnet attack

By

Nearly a million customers of telecoms company Deutsche Telekom AG began experiencing network outages, possibly to due hacker sabotage.

With GDPR imminent, it's crucial we tackle the biggest myths surrounding data regulation and cyber-security

With GDPR imminent, it's crucial we tackle the biggest myths surrounding data regulation and cyber-security

Lillian Pang addresses some of the most common misconceptions surrounding the new GDPR legislation

Mergers & acquisitions:  a lesson in cyber-security complacency and reputational ruin

Mergers & acquisitions: a lesson in cyber-security complacency and reputational ruin

When you undertake an acquisition, cyber-security must be a top integration priority. If left to fester, it will eventually catch you out says Ian Kayne.

Keeping pace with the speeding wheel of change

Keeping pace with the speeding wheel of change

Kevin Davis discusses how vital it is that organisations look to agility as a way of providing speed of change and embracing new technologies to facilitate customer needs

Analysis finds high-risk vulnerabilities in four popular WordPress e-commerce plug-ins

Analysis finds high-risk vulnerabilities in four popular WordPress e-commerce plug-ins

By

A static code analysis of 12 commonly used WordPress e-commerce plug-ins found that at least four of them contained one or more high-risk vulnerabilities.

Frequent job changes mean less chance for secure storage of employment records

Frequent job changes mean less chance for secure storage of employment records

By

Large volumes of employees moving from job to job increases the number of employment records that must be retained by HR departments, stored securely and ultimately destroyed within a legally determined timeframe.

On the Gatak: Trojan gang lures victims with fake software keys

On the Gatak: Trojan gang lures victims with fake software keys

By

The old adage that crime does not pay is not only applicable those cyber-criminals who are caught, but also to many of the victims of the Gatak Trojan who download it while attempting to gain access to pirated software.

52% of millennials are worried about stolen identity via mobile activity

52% of millennials are worried about stolen identity via mobile activity

By

More than half of UK millennials are concerned about having their identity stolen online, or through mobile/app-based activities, with women more concerned than men by a margin of 65 percent.

Eir we go again: Irish ISP router flaw allows total takeover

Eir we go again: Irish ISP router flaw allows total takeover

By

An open port linked to remote management software on Eir's D1000 modem router can allow an attacker to take over consumers' networks.

Hacked in 98 seconds: Expert's camera rapidly infected by IoT malware

Hacked in 98 seconds: Expert's camera rapidly infected by IoT malware

By

A security expert who hooked up an internet-connected surveillance camera for research purposes reported via Twitter on Friday that the device was compromised by IoT malware after just 98 seconds of being online.

More than a third of Brits plan to give hackable gifts this Christmas

More than a third of Brits plan to give hackable gifts this Christmas

By

Over a third of Brits are planning to gift an internet-connected device this Christmas. The two most popular gifts - smartphone/tablets and laptops - this year are also the two most easily and frequently hacked.

Some Adult Friend Finder members get the hack alert, indirectly

Some Adult Friend Finder members get the hack alert, indirectly

By

Subscribers to the hookup site Adult Friend Finder received notification of a massive hack, but only if they logged in.

UPDATE: Trump taps Pompeo, Flynn and Sessions for key security posts; James Clapper to resign

UPDATE: Trump taps Pompeo, Flynn and Sessions for key security posts; James Clapper to resign

By

President-elect Trump has tapped Rep. Mike Pompeo (R-Kan.) as CIA director, and retired Army Lt. Gen. Michael Flynn as national security advisor, and Sen. Jeff Sessions (R-Ala.) as attorney general.

WhatsApp adds encrypted video calls as services race towards privacy offerings

WhatsApp adds encrypted video calls as services race towards privacy offerings

By

WhatsApp co-founder Jan Koum said the messaging service will add encrypted video calling on Monday, according to a report.

Dark tower in lower Manhattan outed as NSA nerve centre

Dark tower in lower Manhattan outed as NSA nerve centre

By

A telecommunications hub built in 1969 to withstand a nuclear attack, now "appears" to serve as a surveillance site for the National Security Agency (NSA).

Top barrier to cyber-resilience: 'insufficient planning and preparedness'

Top barrier to cyber-resilience: 'insufficient planning and preparedness'

By

Only 32 percent of IT and security professionals say their organisation has a high level of cyber-resilience.

Popular games demand permissions for 'full network access'

Popular games demand permissions for 'full network access'

By

Millions of mobile app gamers are putting themselves at risk of social engineering by allowing apps to access and sometimes control their devices.

47% of UK hiring managers in IT expect more demand for tech pros in 2017

47% of UK hiring managers in IT expect more demand for tech pros in 2017

By

Nearly half of hiring managers in IT expect more demand in 2017 than they did in 2016.

This is PoisonTap, Kamkar tool can hack locked PCs

This is PoisonTap, Kamkar tool can hack locked PCs

By

Security researcher Samy Kamkar rolled out a hacking tool dubbed PoisonTap that can crack into a locked computer fully exposing the device to a myriad of potential hacking problems.

Android phones dialing home, to China

Android phones dialing home, to China

By

Firmware on some Android phones has been detected collecting user data and transmitting it to third-party servers in China, according to mobile security firm Kryptowire.

CrySiS ransomware decryptor keys posted

CrySiS ransomware decryptor keys posted

By

The decryptor keys for the CrySiS ransomware were posted in a Bleeping Computer forum early on 14 November, possibly by one of the ransomware's developers.

Interest in encrypted email spikes following Trump win

Interest in encrypted email spikes following Trump win

By

Government-resistant, end-to-end encrypted email services received a spike in interest following Donald Trump's win in the US presidential election

10-year-olds break safety rules set by parents to hide cyber-lives

10-year-olds break safety rules set by parents to hide cyber-lives

By

Forty-two percent of 10-year-olds believe they have the skills to hide what they've been doing online from parents. By age 13, this figure rises to 70 percent.

Study finds malware lurking in Amazon, Google and Groupon cloud services

Study finds malware lurking in Amazon, Google and Groupon cloud services

By

A recent study detected more than 600 cloud repositories hosting malware and other malicious activities on major cloud platforms.

Report disputes Microsoft's "low volume spear-phishing" claim

Report disputes Microsoft's "low volume spear-phishing" claim

By

A new security report casts doubt on Microsoft's attempts to downplay a zero-day exploit used by the Russian APT group.

IoT lightbulb worm takes over all smart lights until entire city is infected

IoT lightbulb worm takes over all smart lights until entire city is infected

By

A research team has set up a chain reaction attack that would take over Philips Hue smart lightbulbs across entire cities

SC Webcasts UK

Sign up to our newsletters

FOLLOW US