Latest News

UK firms at risk from attacks on crypto keys, digital certificates

UK firms at risk from attacks on crypto keys, digital certificates

A joint study from Venafi and the Ponemon Institute reveals that digital keys and certificates are in peril, especially at UK organisations.

Interpol 'agents' detail virtual currency malware threat

Interpol 'agents' detail virtual currency malware threat

The international criminal police organisation Interpol is not just the stuff of spy movies. The global policing body, which now operates with 190 member countries, has identified a threat to virtual currencies.

Russian banks combat Tyupkin ATM malware gang

Russian banks combat Tyupkin ATM malware gang

Russian banks see Tyupkin ATM malware use rise in Russia and take steps to locate culprits.

Features

ICYMI: OpenSSL bugs, stealthy DoS attacks and stealing Bitcoins

ICYMI: OpenSSL bugs, stealthy DoS attacks and stealing Bitcoins

In this latest In Case You Missed It column, we look at the top stories on SC this week, including the discovery of a new OpenSSL bug and super-stealthy denial of service attack.

Firewalls 20 years on: Gil Shwed interview

Firewalls 20 years on: Gil Shwed interview

Mobiles and the cloud may have subverted the idea of perimeter protection, but some 20 years after launching FireWall-1, Check Point founder Gil Shwed tells SC that there's still a security role for the Firewall.

ICYMI: Freak flaws, 'smart' city questions and UK data breaches

ICYMI: Freak flaws, 'smart' city questions and UK data breaches

This week's In Case You Missed It column looks at the top five articles on SC this week, including new Facebook flaws, 'Freak' attacks and the trade-offs with 'smart' cities.

Opinion

Prison escape via mobile phone highlights social engineering vulnerability

Prison escape via mobile phone highlights social engineering vulnerability

A prison escape with a fake release note, from a fake website, set up via mobile phone, demonstrates yet again that people are our biggest security vulnerability says Fotis Gagadis.

Network visibility can prevent you from being the next cyber-security headline

Network visibility can prevent you from being the next cyber-security headline

Better understand what's happening on your network and you'll be better prepared to tackle hostile intruders says Corey Nachreiner.

Five steps to creating a secure software defined environment

Five steps to creating a secure software defined environment

Security is needed everywhere within the software-defined data centre as physical security is no longer an adequate defence against current threats says Dr Gerhard Knecht.