UK Chief Information Security Officers (CISOs) are winning some battles and losing others when it comes to improving their firm's information security practices, according to a new report.
Italy's Hacking Team, an alleged practitioner in the dark art of citizen surveillance, has reportedly been subjected to a severe hack itself.
First prize goes to whoever can locate Gameover Zeus instigator, Evgeniy Mikhailovich Bogachev, worth a £2 million reward from the FBI.
Users of the video-sharing site Plex have been left vulnerable to an attack after the company revealed that members' passwords had been compromised.
A confidential leaked document from Bitstamp details how the Bitcoin trader was hacked and how the crime has been investigated.
Resolving how to speed up Homomorphic Encryption - via a simulated version called Enigma.
LG appears to have changed its mind about patching a security flaw in its Android smart phones which was discovered by security researchers last year.
Amazon manages to cram OpenSSL alternative into just 6,000 lines of code
If the Information Commissioner's Office is to be more aggressive regarding data breaches, it will need more investment.
More than 125 security professionals were asked about the greatest risks that organisations face today as well as the influence of various solutions and architectures.
GoPro Studio tool sends update requests, receives updates as unencrypted traffic
Security flaws would have allowed remote code execution and Man-in-the-Middle attacks
The news that Cisco Systems intends to buy OpenDNS for $635 million (£405 million) raises questions about the company's strategy regarding cloud and IoT security.
If you are routing your traffic through the Tor network, don't make the assumption that it is always providing end-to-end security.
Speaking at a US Federal Reserve conference in Missouri, Jerome Powell called EMV card deployment a step forward but questioned the security of cards that use signatures, not PINs, for authentication.
Recent updates on the people and organisations that make up the information security industry
As APT sophistication grows we're all at risk - even security vendors
Debate: IT Security's male image and lack of female role models are the main reasons for the scarcity of women in the industry
Phyllis Kolmus and Ryan Corey discuss the lack of female role models and its affects in the IT security industry.
Keygen-activated or cracked versions of anti-virus software won't last long
A new credit card-stealing attack is underway on the eBay Magento e-commerce platform, which is used by more than 240,000 businesses worldwide.
Users who have opted for a VPN service could be at risk from hackers thanks to the way that providers handle IPv6 traffic.
Software updates were released for Cisco Web Security Virtual Appliance, Cisco Email Security Virtual Appliance, and Cisco Security Management Virtual Appliance.
Surveys reveal the security risks of cloud storage and computing. Professionals cannot determine types of data.
Chrome and the open source variant Chromium were downloading audio listening software without permission, not in the extensions list, and with audio set to 'enable'.
Hackers exploiting Flash vulnerability to infect machines with Ransomware
It's hoped that a new TLD will revolutionise online bank security, but time will only tell if it will gain traction with the industry and the public.
While 97 percent of mobile malware threats aim at Android, iOS isn't left untouched
Criminal gangs and even ties to state actors can be behind ransomware, and the problem is growing, so ensure its factored in your information security plans.
Claims Toshiba is developing secure quantum cryptography should be taken with a quantum of salt say several cyber-security experts.
A majority of critical infrastructure executives believe their systems appeal to cyber-criminals, but also that they could detect any attack according to Tripwire findings just published.
Samsung has refuted claims that it put users at risk from hacking by disabling Windows Update on its laptops.
A critical defect in ESET's flagship anti-virus products has been discovered by British Google Project Zero researcher Tavis Ormandy.
Harmonised EU data protection reform should be in place by the end of this year according to representatives at a 'trilogue' meeting of the European Parliament, the European Commission and the council of national justice ministers yesterday.
In the year following Gameover Zeus takedown efforts, Dyre has steadily emerged as the financial trojan of choice among cyber-criminals.
A serious vulnerability has been discovered with the MacKeeper utility program which would enable an attacker to encode executable instructions in a URL link.
Cyber-crime and cyber-enabled crimes figure highly in the latest annual National Strategic Assessment (NSA), an analysis by the National Crime Agency of serious and organised crime threats affecting the UK.
Security industry calls on organisations to ditch vulnerable browser plug-in as yet another zero-day flaw hits flash
Government dismisses idea that its Verify identification technology can be used to monitor population.
Britain's Government Communication Headquarters (GCHQ) is actively engaged in reverse engineering anti-virus software to identify exploitable vulnerabilities.
Montefiore Health System announced that 12,517 patients had personal information compromised by a former employee between January 2013 and June 2013.
Belgian court case alleges privacy violations while regulatory concerns halt European deployment of face-recognition app by Facebook.
Encryption keys can be stolen via radio waves using cheap mobile equipment
Thousands of passengers were grounded in Warsaw, Poland last night following a cyber-attack on the computer networks of LOT Polish Airlines.
LinkedIn's director of information security confirms that its private bug bounty programme was formalised in October.
The apple CORED/XARA vulnerability remains unpatched but appears unexploited in the wild.
In Case You Missed It: German government and renewable power sector breaches, new regs due, and VoIP attacks rise
This week's In Case You Missed It looks at major German government breach, turbines attacked, nuclear talks targeted, EU Data law looms larger and finally VoIP due an upgrade.
Online quiz analyses applicants cyber potential, £30k scholarships up for grabs
A team of German researchers claims to have uncovered poor programming practice that is exposing thousands of mobile apps to data breaches.
US lawmakers proposed "Protecting Individuals from Mass Aerial Surveillance Act" on Wednesday to require federal authorities to obtain warrants to conduct aerial surveillance.
A new specially protected communications channel and mobile network is planned for the Ukraine military and government following military losses attributed to intercepted communications.
Voice over IP attacks are on the rise because of the proliferation of online tools and software which can target these services.
Eighty-six IT professionals were guests of RC Prison Ashwell last weekend while they tried to figure out who among their number betrayed them.
Researchers at NowSecure have uncovered a vulnerability in the stock keyboard that is pre-installed on 600 million Samsung devices, including the new Galaxy S6, that can apparently enable a remote arbitrary code execution attack.
SC Webcasts UK
Sign up to our newsletters
SC Magazine UK Articles
- Tor network exit nodes found to be sniffing passing traffic
- Old-school router attack wreaking havoc to networks
- VPN services at risk from IPv6 vulnerability
- Can Bitcoin-based Enigma encryption succeed where HE has failed?
- Updated: Hackers blow the doors off Hacking Team, expose 400GB confidential data