Motorola has, perhaps strangely, concluded that it will not be releasing monthly updates for its new Moto Z smartphone. A strange thing to announce, according to the wider industry
Trend Micro researchers spotted a new ransomware as a service (RaaS), dubbed Stampado, which may be indicative of ransomware market trends.
POS-terminals have increasingly become a target for cyber-attackers in Russia, posing a threat to ordinary buyers and shoppers, according to analysts of FinCERT
Two security vulnerabilities have been found and fixed in password manager LastPass. One by prolific security-vulnerability finder Tavis Ormandy, and the other by Mathias Karlsson of Detectify Labs.
Creators of the rival Petya and Mischa ransomware programmes have leaked the private keys of Chimera ransomware.
Several organisations within the public sector still need to give 'Bring Your Own Device' (BYOD) initiatives proper consideration. Only then can security risks be avoided and the benefits of BYOD completely achieved.
An Arab-American policy organisation has joined with civil liberties and privacy groups to address domestic surveillance policies that target Arab American and American Muslim communities.
To enhance the use of its web portal, gov.uk, the UK government is testing the use of its subscribers' social media logins as an authentication method.
New research claims to show that up to three percent of hidden services directories, the backbone of the Tor anonymous router system, have been compromised, which could enable the identification of users in some cases.
Highly placed intelligence officials are pretty sure that the hackers who breached the Democratic party just over a month ago were backed by the Russian government.
A tranche of data from a Turkish natural gas company, Izmir Gaz, has been leaked online by the hacktivist group Anonymous in a seemingly convoluted attempt to get at the Turkish government
Nearly a quarter (23 percent) of businesses claim that they stop a data breach every day.
Privacy vs security is a contradiction in terms, according to the European Data Protection Supervisor Giovanni Buttarelli who has been reaffirming his opposition to encryption backdoors.
Europe's data protection committee is going to let Privacy Shield operate for a year, promising to hold off on legal challenges until its first joint annual review happens in 2017.
Fearing a Russian cyber-attack, Estonia is reportedly negotiating with the UK and Luxembourg governments to store citizen data in the UK.
A flood of information has emerged that connects GOP presidential nominee Donald Trump to a questionable cast of characters who are linked to Russian interests.
The first five months of 2016 were dominated by malicious email campaigns, the quick emergence of new ransomware variants, one of the largest botnets in the world went dark, and the Angler exploit kit (EK) went silent
Customers of the popular mobile network O2 are having their details sold on a dark web marketplace
Security company SentinelOne is now offering US$ 1000 (£762) per machine or up to US$ 1 million (£762,000) per company as compensation if a ransomware infection occurs while their product is installed.
Information and data experts at IHS Markit are reporting exponential growth of video doorbells which are outpacing conventional video door phones. But are they safe?
A mid-year update to HID's top 2016 security trends has been released. During the first six month's of the year, HID stated continued progression in market adoption of mobile solutions and interest in the Internet of Things (IoT).
NSA Whistleblower Edward Snowden and hacker Andrew Huang have co-designed a smartphone case that tells its owner when their phone is being hacked.
A new Facebook app from Hillary Clinton's presidential campaign which invites users to "Trump Yourself" could contain privacy implications.
Counsel for Lauri Love and the US government rehearsed their final arguments as Tom Reeve reports from Westminster Magistrates' Court yesterday.
Cyber-crime requests triple in three years as international agencies seek greater cooperation to combat the threat.
How has Anonymous avoided being labeled as a terrorist group? That is a serious question that was proposed by an anthropologist during the HOPE Conference in New York City.
The cyber-gang behind the Patchwork, aka Dropping Elephant, cyber-espionage campaign has expanded its reach outside of government organisations and is now hitting the private sector.
The leak of 19,000 embarrassing emails from the Democratic Party has got the Clinton campaign talking about Russian involvement and how foreign actors may be trying to manipulate the outcome of November's election.
More than 2.3 million users records were compromised as two separate gaming companies announced they suffered data breaches.
Researchers have found several security vulnerabilities in SAP HANA and SAP Trex, which left thousands open to remote code execution attacks
WhatsApp messages of Turkish military officers involved in last week's failed coup have been published by state-run media outlets, prompting questions as to how exactly the Turkish government got in to the encrypted messaging app.
The ransomware PowerWare that commandeers Microsoft's PowerShell utility to download and run malicious code, now has a variant that mirrors Locky ransomware.
Self-driving cars in Germany may soon be required to carry a black box to help determine fault.
The Dutch National Police, Europol, Intel Security and Kaspersky Lab have joined forces to launch an initiative which will see the cooperation fight ransomware.
In the UK, 41 percent of online daters have been spammed or scammed when using online dating services.
Nearly two-thirds (65 percent) of IT security pros would be grounded in some capacity for the messy state of their firewall rules.
Google's latest transparency report displays a continued increase in data requests the company received from government authorities.
The latest In Case You Missed It (ICYMI) looks at BT outage; Euro CNI vulnerable; 4 rail attacks; Polish telco breached; ransomware uses cloud
Cooperating with law enforcement is "our basic civic responsibility," BlackBerry CEO John Chen told reporters at a media Q&A at the BlackBerry Security Summit in New York.
As the Pwnage summer heat rages on, hackers find 64 holes in popular publishing platform, WordPress
Cyber-security experts in Russia are concerned about the data collecting abilities of apps such as Pokemon Go, even speculating whether they were specifically created by western security services as cyber-espionage tools
With the first concrete inclusion of cyber-crime and fraud stats, the Office of National Statistics has shown that cyber-crime is nearly high as all other kinds combined.
In the third such scenario in the last eight months a Brazilian judge has ordered WhatsApp to be blocked in Brazil, before a higher circuit judge overturned that block.
Two internet outages on consecutive days in separate internet exchanges in Docklands, London, calls into question the security of the country's critical communications infrastructure.
The Wassenaar Arrangement for regulating the international arms trade is threatening to choke the international cyber-security community and ultimately make us less secure, cyber-security experts are saying.
The Guardian Project has integrated Tor security into the Internet of Things (IoT), creating a Tor Onion Service Configuration for the Home Assistant open source platform.
Despite a slow start at the beginning of 2016, the IT jobs market in London experienced an upturn in the number of jobs with June being the highest month so far for job volume in 2016.
Turkey blocked access to WikiLeaks after almost 300,000 emails from the Justice and Development Party (AKP Party) were released Tuesday.
A group claiming to be a far-right Ukrainian nationalist group has attempted to blackmail the Polish ministry of defence.
Over the last six months, global demand for network engineers who have DDoS mitigation skills has continued to grow. China is seeing the most demand for these skills, with roughly 47 percent annual growth.
Admins scramble to patch HTTP proxy header flaw, Httpoxy, that leaks data via PHP, Go and Python scripts running in a CGI environment.
Organisations are increasingly being targeted by ransomware and more often than not pay the ransom to regain control of their data.
The Neutrino exploit kit (EK) added a former Internet Explorer zero-day vulnerability to its arsenal.
BT Broadband has suffered a major outage this morning and it's pointing the finger at a power-outage in one of its central London service providers.
Kaspersky Lab researchers spotted the Ammyy Admin being used as a dropper trajan to install the Lurk trojan and other malware.
In its new special report Ransomware and Businesses 2016, Symantec declares that within the last year, ransomware has rapidly advanced in maturity and severity, while also exploding in terms of overall numbers.
Apple patches critical vulnerabilities in iOS and OS X that could allow remote code execution.
Europe's highest justice court, the European Court of Justice (ECJ), has ruled that bulk data collection 'can only be used to fight serious crime'.
According to new global research from Dell's Digital Transformation Security Survey, security is often seen as a barrier to digital transformation, therefore brought into the process too late to make a meaningful impact.
Study reveals majority of CISOs and CIOs recognise risk of material attacks that originate on the internet, but need better resources & infrastructure to identify and mitigate threats.
Ironically, the cyber-criminals holding your computer files for ransom may be offering you a better customer experience than your average cable provider or insurance company.
Kaspersky researchers have spotted the Lurk banking Trojan lurking around as legitimate pieces of software on Ammyy.com
Customer data including bank details entered on web forms lost in major data breach at Polish telecom operator.
Three suspects were arrested after a network of Eastern European and Russian cyber-criminals used malware to steal £1.8mil ($2.5 million) in cash from dozens of machines around the country.
Cyber- criminals have noticed the lucrative opportunities for wrong-doing in leveraging cloud services and evolved new techniques to their benefit.
Two separate groups are claiming responsibility for a supposed DDoS attack on Pokemon Go servers. Pokemon Go's developers say that it's merely too popular
Most security pros (88 percent) say that they are happy with their organisation's security strategy, but 38 percent admit that their company doesn't have dedicated data loss prevention solutions in place.
Jane Frankland talks about her upcoming book on women in the security industry and also invites readers to take part in her survey of men and women about gender equality.
Power stations in Germany, Italy and Israeli smart building could be accessed by criminal hackers
At a recent SC Roundtable event, we caught up with Jim McCoy, technical lead for security tools and operations at Facebook. He told us how Facebook used its experience dealing with inside threats to combat external attackers.
DARPA are starting a competition to help automate defence and see how artificial intelligence can combat cyber-threats.
NATO CCDCOE urged to promote cooperation in training of cyber-defence experts as the cyber realm declared a theatre of war.
A cryptography Ph.D. student has accused WhatsApp of blocking calls to Saudi Arabia phone numbers and deceiving users
Privacy advocates have hailed the Second Circuit's ruling as a victory for Microsoft and, if it holds, it will likely inspire confidence among privacy advocates and European privacy regulators about the fortitude of the US' privacy posture.
A debate in the House of Lords has unearthed some previously unnoticed powers included in the much maligned investigatory powers bill including the desire to break end-to-end encryption.
ICYMI: Spotting encrypted malware; Russia attacked; Power plant malware; Malicious Pokemon; Amazon breached?
The latest In Case You Missed It (ICYMI) looks at Spotting encrypted malware; attacks on Russia; Malware in power plant and more
Su Bin, the head of an aviation company, has pleaded guilty to conspiring with Chinese officials to steal information from US military defence contractors
Symantec has spotted a new banking malware that stops a victim from cancelling a compromised payment card by blocking calls from the infected device to the bank's customer service department.
A team of researchers has created an anonymity network methodology that they believe is more efficient and more secure than existing anonymous networks such as Tor.
A US Congress committee has condemned the Federal Deposit Insurance Corporation for covering up a number of breaches
ATMs in Taiwan were spewing money over the weekend in what authorities believe were malware-aided thefts.
Over two thirds (68 percent) of consumers across Europe are interested in using biometrics when making a payment, especially when integrated with other security measures.
BT Security has struck a deal with ISC(2) to offer those training through the BT Security Academy Certified Information Systems Security Professional (CISSP) and the Systems Security Certified Practitioner (SSCP) certifications.
Cyber Security Challenge UK is searching for the best amateur cyber-talent to represent the UK in the European Cyber-Security Challenge in Germany in October later this year.
As the FBI declares its malware-like software cannot be malware as it is used with non-malicious intent, we ponder the ethics of the good guys using the same tools as the bad guys.
Security researchers find malicious versions of Pokemon GO app, while the firm behind new gaming frenzy Pokémon GO, Niantic, apologises for privacy mishaps.
A new piece of malware has been discovered skulking around the systems of an unnamed European energy company, according to Sentinel One Labs.
The Commons Science and Technology Committee reports that by 2017, the UK will need 745,000 more workers with digital skills and warns that organisations lacking the necessary digital skills face increased security threats and failed cloud migrations if the problem is not addressed.
Most (88 percent) IT decision makers in UK and German organisations believe that shadow IT makes them more vulnerable to cyber-attacks.
Borg-like voice commands from your phone could take control of nearby Android devices using a newly demonstrated voice recognition vulnerability.
Over half (53 percent) of companies have at least one instance of Windows Server 2003 still running even though its end of life (EOL) date passed on 14 July 2015.
By analysing changes in files, security researchers believe they have discovered a way to detect ransomware in the early stages of encrypting your data.
Just as Western governments are concerned about Chinese or Russian state hackers, the Kremlin worries that its government agencies are under increasing western attack, and is concerned about skill shortages in government.
Your next scam du jour: targeted stings and swindles based on impersonating key personnel are hitting as many as 400 companies a day.
Haymarket and SC Magazine launch SC Jobs - a new job site dedicated to information security professionals.
SC Webcasts UK
Sign up to our newsletters
Professor in Cyber Security and Networking
Edinburgh Napier University - Edinburgh
Lecturer in Cyber Security and Networking
Edinburgh Napier University - Edinburgh
Associate Professor in Cyber Security and Networking
Edinburgh Napier University - Edinburgh
CISO - Chief Information Security Officer (Up to £100K)
Evolution Recruitment - London (North), London (Greater)
Cyber Security, Intelligence & IA Consultants
Electus Recruitment - London (West), London (Greater)
- See All Jobs »
SC Magazine UK Articles
- It's a trap! WhatsApp Gold 'premium' version lures users to malware
- SC Awards Europe 2016 winners announcements!
- Microsoft ends common password use and password lockout
- ISIS radicalises 'lone wolves' through strong social media presence
- 1.5 billion Windows computers potentially affected by unpatched 0-day exploit