Most companies (90 percent) agree that identity and access management (IAM) is important to their company's digital transformation success.
Cyber-criminals have updated a two-year old banking app scam that grabs control of a victim's smartphone, locks them out and then drains their bank account while the person struggles to regain control of their device.
A third of companies are not clear on what specific information is archived and stored in their tape storage, posing risk and high cost to their business.
A Tor executive has confirmed that a zero-day vulnerability impacting Tor and Firefox has been spotted being used to execute malicious code, but it has been reported to Mozilla, according to ARS Technica.
Nearly a million customers of telecoms company Deutsche Telekom AG began experiencing network outages, possibly to due hacker sabotage.
With GDPR imminent, it's crucial we tackle the biggest myths surrounding data regulation and cyber-securityNovember 29, 2016
Lillian Pang addresses some of the most common misconceptions surrounding the new GDPR legislation
When you undertake an acquisition, cyber-security must be a top integration priority. If left to fester, it will eventually catch you out says Ian Kayne.
Kevin Davis discusses how vital it is that organisations look to agility as a way of providing speed of change and embracing new technologies to facilitate customer needs
A static code analysis of 12 commonly used WordPress e-commerce plug-ins found that at least four of them contained one or more high-risk vulnerabilities.
Large volumes of employees moving from job to job increases the number of employment records that must be retained by HR departments, stored securely and ultimately destroyed within a legally determined timeframe.
The old adage that crime does not pay is not only applicable those cyber-criminals who are caught, but also to many of the victims of the Gatak Trojan who download it while attempting to gain access to pirated software.
More than half of UK millennials are concerned about having their identity stolen online, or through mobile/app-based activities, with women more concerned than men by a margin of 65 percent.
An open port linked to remote management software on Eir's D1000 modem router can allow an attacker to take over consumers' networks.
A security expert who hooked up an internet-connected surveillance camera for research purposes reported via Twitter on Friday that the device was compromised by IoT malware after just 98 seconds of being online.
Over a third of Brits are planning to gift an internet-connected device this Christmas. The two most popular gifts - smartphone/tablets and laptops - this year are also the two most easily and frequently hacked.
Subscribers to the hookup site Adult Friend Finder received notification of a massive hack, but only if they logged in.
President-elect Trump has tapped Rep. Mike Pompeo (R-Kan.) as CIA director, and retired Army Lt. Gen. Michael Flynn as national security advisor, and Sen. Jeff Sessions (R-Ala.) as attorney general.
WhatsApp co-founder Jan Koum said the messaging service will add encrypted video calling on Monday, according to a report.
A telecommunications hub built in 1969 to withstand a nuclear attack, now "appears" to serve as a surveillance site for the National Security Agency (NSA).
Only 32 percent of IT and security professionals say their organisation has a high level of cyber-resilience.
Millions of mobile app gamers are putting themselves at risk of social engineering by allowing apps to access and sometimes control their devices.
Nearly half of hiring managers in IT expect more demand in 2017 than they did in 2016.
Security researcher Samy Kamkar rolled out a hacking tool dubbed PoisonTap that can crack into a locked computer fully exposing the device to a myriad of potential hacking problems.
Firmware on some Android phones has been detected collecting user data and transmitting it to third-party servers in China, according to mobile security firm Kryptowire.
The decryptor keys for the CrySiS ransomware were posted in a Bleeping Computer forum early on 14 November, possibly by one of the ransomware's developers.
Government-resistant, end-to-end encrypted email services received a spike in interest following Donald Trump's win in the US presidential election
Forty-two percent of 10-year-olds believe they have the skills to hide what they've been doing online from parents. By age 13, this figure rises to 70 percent.
A recent study detected more than 600 cloud repositories hosting malware and other malicious activities on major cloud platforms.
A new security report casts doubt on Microsoft's attempts to downplay a zero-day exploit used by the Russian APT group.
A research team has set up a chain reaction attack that would take over Philips Hue smart lightbulbs across entire cities
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack
- 9.2 million medical records for sale on darkweb
- ICYMI: Tesco warned; IP Bill threatens economy; German routers offline; Azure trojan; Gooligan fraud
- Data centres are on the move - where will they end up?
- 90% of ITDMs believe IAM is crucial to digital transformation success
- Research: Hacked companies could see customer exodus if breached
- Misconfigured drive exposes locations of explosives used by oil industry