SC's most recent roundtable visited that most pressing of topics, the General Data Protection Regulation and how to get ready before it takes effect.
UK Defence Secretary Michael Fallon announced that the UK will invest up to £265 million to boost the defence of military cyber-systems
McDonald's has been tinkering with the idea of using biometrics to manage employee access to corporate systems inside its retail locations, said a McDonald's corporate manager at SC Congress Chicago on Thursday.
1.3m Australian Red Cross records leaked, exposing medical data
Companies should spend less time worrying about meeting minimal requirements for cyber-security compliance, and concentrate more on how to protect their most sensitive operations, according to experts speaking today at SC Congress Chicago.
Thomas Schreck, principal engineer of Simenes' CERT, alongside Margrete Raaum, leader of the KraftCERT from Norway told an audience at 4SICS 2016 on why cyber-threat intelligence plays an important part in information sharing in the energy industry.
It's official — there are now more millennials than baby boomers and their influence on information security is starting to have its impact, according to a recent report from LaunchTech that was commissioned by Forcepoint.
Nearly half of UK organisations (47 percent) feel they have insufficient skills in-house to deal with the current cyber-threat landscape.
Researchers spotted a variant of malware campaign dubbed "CloudFanta" which may have been used to steal 26,000 email credentials
Vidar Hedtjarn Swaling, analyst for the societal security and safety department at the Swedish Defence Research Agency announced his department's research into how ageing is regarded, and dealt with, in the area of industrial control systems.
Sean Sullivan, security advisor at F-Secure Labs, has warned that hackers could severely disrupt the reporting of the US general election on 8 November by hacking AP servers.
Kaspersky Lab says young cyber-security talent should be used to the industry's advantage, but education and businesses must first provide more programmes and roles to pave the way for new generations.
Industrial cyber-security firm Indegy has found a remote code execution vulnerability inside Schneider Electric's flagship ICS management software, Unity Pro.
A new paper from Trend Micro has shown that outdated technologies are still being used in security-critical areas. Is this a step back for security in the places that its need most?
After a two week break that saw few Locky ransomware attacks, the Cisco Talos research team discovered a new variety that sports not only a scatologically named extension for the encrypted files but another reference that insults Linux.
According to John Matherly - internet cartographer, security gadfly and founder of IoT-search engine Shodan - the internet of connected things is very much here to stay.
Over the past year, the number of job postings in the UK for positions requiring skills in Internet of Things (IoT) related technologies has increased by 70 percent - and that's just the tip of the iceberg.
Israeli mobile forensics firm Cellebrite could have some of their methods exposed after a reseller partner reportedly made the company's firmware and software publicly available to download.
A fundamental fault in the SSL handshake could allow hackers to use subvert MacOS and iOS devices and recruit them into a DDoS attack.
Erwin Kooi, information security architect spoke at 4SICS 2016 and shared his thoughts on digitising Alliander's electricity service, while making sure it stays secure.
A Freedom of Information Request has unearthed the fact that for local councils, health and safety training is far more favoured than IT or data security.
Chris Inglis, former deputy director at the NSA, says the organisation had not been prepared for an insider threat of the magnitude of Edward Snowden and rejected calls for him to be pardoned.
The Mirai DDoS attack that took down a slew of prominent websites last Friday was most likely initiated by users from hackforums[.]net and not a nation-state or cyber-criminal organisation, according to FlashPoint.
Robert M. Lee, CEO of Dragos Inc., says that not enough information sharing happens in ICS industry, because of this the threats to ICSs are largely unknown.
The Deputy Information Commissioner, Steve Wood says that UK businesses are caught in a confusing place, between looming EU regulation and Brexit
A large scale DDoS attack, carried out by a botnet of hacked Internet of Things devices, many of which were made by Chinese firm Xiongmai has now prompted a product recall.
An international team of researchers have developed an exploit to "root" access Android phones made by LG, Samsung and Motorola using Rowhammer hardware attacks.
The GM Bot mobile banking malware has been revamped to deploy on Android 6 devices effectively bypassing the security put in place on the operating system.
The security industry is watching the growth of smart cities with increasing suspicion. Their gripe? How to defend them.
In just the past year, a Russian hacking gang exploited at least six zero-day vulnerabilities in Windows, Adobe Flash and Java to attack the email servers of the Democratic National Convention (DNC) in the US.
More and more workers today are bringing their personal devices such as laptops, mobile phones and tablets to the office to use for work.
Persistence pays off as security researcher nets bug bounty for unearthing an access control bypass allowing attackers to reset passwords if they know the usernames.
A Chinese cyber-attack targeting a US Defence Department contractor was linked to the OPM hack.
DDoS attacks using IOT botnets take down parts of the internet delivering Twitter, Spotify, Netflix, GitHub, Amazon and Reddit among others.
The PlayStation Network (PSN) is reportedly down worldwide on the same day as the launch of Battlefield 1, one of the network's biggest games.
Outage at DNS provider Dyn leads to multi-site blackout
Cyber-criminals use VoIP services to infect gamers with malware
Web design platform notifying customers after being hit eight months ago
Police apparently don't have the means to properly address the looming threat of cybercrime according to the latest Crime Survey of England and Wales
An independent researcher found gaping holes GOP presidential nominee Donald Trump's own email servers.
The Russian man that Czech authorities arrested on 5 October in collaboration with the FBI is allegedly connected to the 2012 breach of LinkedIn.
Following the US announcements that it is planning to retaliate for presumed Russian hacking of the DNC, Russia says it is making preparations to mitigate the impact of any such attack, while suggesting the US has more to lose.
Nearly half of consumers see Artificial Intelligence as having a positive impact on society, compared to seven percent who do not.
An law which will make companies tell customers and regulators when they've been breached is making yet another passage through Australia's legislative assembly.
A 33-year-old man from Cardiff has been charged for allegedly teaching members of ISIS how to encrypt
More than half of cyber-security professionals find it difficult to highlight possible security system weaknesses for senior management, while the rest find it more difficult to admit something has gone wrong.
As Election Day approaches, researchers have detected a marked uptick in malicious cyber campaigns that seek to capitalize on the highly contentious 2016 race for president.
The Police of the Czech Republic on Tuesday announced the arrest of an unnamed Russian citizen suspected of hacking US-based targets.
Which vulnerability do you fix first, the one that's quickest to fix or the one that can cause the most damage? Targetting the most prevelant vulnerabilities may not always be the best option.
About 15 percent of all home routers are unsecure, according to a study recently released by ESET.
A privacy-focused search engine, Startpage.com, will no longer be including Yahoo search results in its work.
Local authorities hold sensitive and private information about all of us that we wouldn't want getting into the hands of the wrong people.
Cyber-criminals extract financial information using website product pictures
Get Safe Online is urging businesses to better train staff to spot the signs of fraud, as Action Fraud reports a 22 percent increase in crimes reported in the last year.
UK's first-ever director general for digital and media comes with an impressive background in cyber-security policy including a stint as director of cyber security and information assurance in the Cabinet Office.
The threat actors behind the notorious Dyre banking Trojan may be back in action, this time supporting the new TrickBot Trojan.
Internet of Things (IoT) devices running on the open-source Linux OS are under attack from NyaDrop.
Slovakia is in the process of drafting its first cyber-security law which will address not only the security of finance and health but also critical utilities infrastructure.
This week marks the 25th anniversary of the Save Bletchley Park Campaign. The National Museum of Computing (TNMOC) is paying tribute to all campaigners, especially Margaret Sale who has given 25 years of service ensuring the memory of the Second World War codebreakers.
The sheer scale of companies' lack of comprehension of the European General Data Protection Regulation (GDPR) is revealed in a new survey from Symantec
A new ransomware variant written in Python and named CryPy has been uncovered by an Avast security researcher that while dangerous is also littered with flaws that make it less effective.
An adult video scam that was discovered infecting Russian Facebook users back in April is now targeting Europeans, Kaspersky Lab reported via its Securelist blog.
The increasing security provided by EMV payment cards, or chip cards, may be compelling European criminals to eschew the use of malware in favour of explosives to steal money from ATMs.
Reuters has reported that UK banks, some of the largest in the world, are not sharing information under reporting attacks by a long way
Keith Lowry took time on a trip to Australia to warn that background checks do not make the cut when trying to stop insider threats.
The Tribunal which oversees UK foreign and domestic intelligence has handed down a damning judgement that the intelligence services unlawfully collected the personal data of UK citizens for over a decade.
IDC analysts are forecasting that by the year 2020, spending on security products will hit US$100 billion.
The fight against ransomware is going global as an initiative by the Dutch police and Europol begins to attract support from Europe and the rest of the world.
"Covert" action against Russia planned by Obama administration says NBC report
CE2016, the fourth in a semi-annual series of pan-European cyber-security exercises organised by ENISA, has concluded today, bringing to a close six months of activity.
This week: NSA webcam exploits, Microsoft Exchange, top 5 phishing lures and FastPOS malware
According to new research from the Ponemon Institute and Netskope, as cloud services usage - and risk - increases, businesses still lack visibility into data breaches.
SC Magazine UK went down to a Cyber-Rescue Alliance designed to teach CEOs how to respond to a breach when eventually, and inevitably happens.
Thousands of retailers have been hit by credit card detail stealing malware. They way the hackers got in? unpatched software flaws.
Brazil has emerged as a primary centre of financially motivated e-crime threat activity.
Symantec researchers noted an uptick in phishing email attacks using malicious WSF attachments to infect users with ransomware.
Since the source code to the Mirai IoT botnet was publicly leaked, researchers at Imperva have uncovered evidence of several low-level DDoS attacks that were likely perpetrated by new users testing out this suddenly accessible tool.
A pair of Moldovan nationals have been given a combined sentence of over a decade for laundering the ill-gotten gains of the Dridex trojan
A new report states that the UK is not prepared for a future that includes robotics and Artificial Intelligence
A senior UN official has told press that a nuclear power plant was disrupted several years ago by a cyber-attack
Sixty-two percent of organisations leave data protection and availability of in-cloud data to third-party cloud providers.
As Amazon uncovers login credential list online, does controversial GCHQ password advice still stand?
The unveiling of a new surprise from Amazon may tell us surprising new things about the continuing usefulness of passwords, so does GCHQ's landmark advice still stand?
Eighty-nine percent of UK organisations experience increased customer retention owing to their security practices.
Trend Micro researchers found that cyber-criminals are using video game currency to launder real world money.
Trend Micro researchers have spotted several exploit kits delivering Cerber 4.0 ransomware just a month after the release of version 3.
New global research from Dell reveals the lack of awareness among SMBs and large enterprises of the requirements of the EU's GDPR, going into effect in under two years
Patent reveals firm wants to use billboards to collect people's information
Microsoft is now bundling security updates into one, causing concern at IT teams who fear the effects of certain updates on the networks.
A report by the Australian Cyber-Security Centre says that the misuse and over-hyping of cyber-security terms has hampered the public's ability to understand cyber-security issues.
SC Webcasts UK
Covert Technical Operations Specialists
MI5 - London (Central), London (Greater)
Covert Technical Operations Specialists
MI5 - London (Central), London (Greater)
CISO – Chief Information Security Officer (Up to £100K)
Evolution Recruitment - London (North), London (Greater)
Information Security Manager
Infosec People - Hammersmith, West London
Ethical Hacker / Penetration Tester – Based in North West - £50K plus bonus and benefits
Adeptis - North West
Sign up to our newsletters
SC Magazine UK Articles
- It's a trap! WhatsApp Gold 'premium' version lures users to malware
- SC Awards Europe 2016 winners announcements!
- Microsoft ends common password use and password lockout
- ISIS radicalises 'lone wolves' through strong social media presence
- 1.5 billion Windows computers potentially affected by unpatched 0-day exploit