Latest News

Voter databases in two US states breached by foreign hackers

Voter databases in two US states breached by foreign hackers

The FBI's Cyber Division uncovered evidence that election databases in two US states were hacked.

Cozy Bear suspected of hacking Russia-focused think tanks in Washington.

Last week, members of Russian hacking group Cozy Bear attacked several organisations which were researching for the subject, 'Russia'.

HostSailor threatens Krebs with lawsuit

Web hosting company HostSailor has threatened legal action against KrebsonSecurity for posting a story, based on a Trend Micro report, tying that web firm to a now defunct group known for nefarious web activities.

Features

ICYMI: UAE VPN ban; Malvertising; Voice recognition, US drops SMS; Bitcoins stolen

ICYMI: UAE VPN ban; Malvertising; Voice recognition, US drops SMS; Bitcoins stolen

The latest In Case You Missed It (ICYMI) looks at UAE's VPN ban; Hidden malvertising; Bank voice recognition; US drops SMS -2F; Bitcoins stolen.

AI in cyber-security - are we trying to run before we can crawl?

AI in cyber-security - are we trying to run before we can crawl?

Intelligent and automated systems are currently being touted as the next step in cyber-security to help combat the 'always-on' cyber-criminal, but are they right for us? And are we prepared for them?

ICYMI: Coup messages, Pokemon threat, gaming breach, SAP HANA bug, ransomware fight

ICYMI: Coup messages, Pokemon threat, gaming breach, SAP HANA bug, ransomware fight

The latest In Case You Missed It (ICYMI) looks at Whatsapp leaked; Pokemon a threat?; gaming breach; SAP HANA remote control; Fight against ransomware

Opinion

Are you getting a 'Return on Governance'?

Are you getting a 'Return on Governance'?

David Mount discusses the need for access governance, the kind of return that can be expected on it, and delivering a return on governance

Ransomware stops here - preventing network-wide ransom attacks

Ransomware stops here - preventing network-wide ransom attacks

Kasey Cross explains the devastation an organisation undergoes when struck by ransomware and describes preventative measures that can be taken to avoid spread from a single machine to a network.

Artificial intelligence and the future of cyber-security

Artificial intelligence and the future of cyber-security

Alexandre Arbelet and Daniel Brown explain the role of artificial intelligence in enhancing cyber-security