This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Latest News

GCHQ certifies six MSc cyber security degrees

GCHQ certifies six MSc cyber security degrees

Francis Maude, Minister for the Cabinet Office, announced today that six Master's degree courses in cyber security are to be certified by GCHQ.

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Researcher develops BadUSB code to compromise USB sticks - and their computer hosts

Karsten Nohl also reveals how an enhanced security approach can beat his USB architecture compromise.

What's the odds? Paddy Power loses 650,000 records in 2010 breach

What's the odds? Paddy Power loses 650,000 records in 2010 breach

Popular bookmaker Paddy Power has admitted that a data breach it suffered it 2010 affected 649,055 people - around a third of all customers - but stresses that no financial information or passwords were compromised.

Cybercrime threat landscape evolving rapidly

Cybercrime threat landscape evolving rapidly

New research claims to show that, whilst spam levels fell to a five-year low last month, the increasing complexity of cyber-criminal attacks shows no sign of easing, with increasing levels of malware attacks and dangerous PDFs rapidly becoming the norm.

Tor Project unearths attack that identifies users

Tor Project unearths attack that identifies users

Users of The Onion Router (TOR) network have been warned of an attack that could deanonymise them if they used the service from February to July this year.

Features

The 5 most read articles this week: July 25-31

The 5 most read articles this week: July 25-31

Here are the five most popular articles, as read by you the reader, in the week for July 25 to 31.

ICYMI: Driverless cars, cyber espionage & the hidden cost of data breaches

ICYMI: Driverless cars, cyber espionage & the hidden cost of data breaches

This week's In Case You Missed It column considers early security questions on driverless cars, the hidden cost behind data breaches and new claims of industrial cyber espionage.

The 5 most read articles this week: July 18-24

The 5 most read articles this week: July 18-24

Here are the five most popular SC articles, as seen by you the reader, in the week for July 18 to 24.

Opinion

Real threats start with humans, not technology

Real threats start with humans, not technology

When the two IPs meet (intellectual property and internet protocol) the value of the business becomes vulnerable says Dave King, with IT often just providing a sticking plaster to hide C-suite ignorance.

Securing the energy industry: is success a dead CERT?

Securing the energy industry: is success a dead CERT?

Industry needs a brighter collaborative approach to help bring it out of the dark ages says Alan Carter

The science behind DDoS extortion

The science behind DDoS extortion

Don't capitulate, have a plan in place, and of course, prevention is better than cure when it comes to tackling the prospect of DDoS ransom attacks says Dan Holden.

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more