Latest News

Hackers investing 40% of crime proceeds in new criminal techniques

Hackers investing 40% of crime proceeds in new criminal techniques

Cyber-criminals are investing up to 40 percent of their stolen funds in improving and modernising their techniques and criminal schemes according to a recent report issued by cyber-experts at the Russian Ministry of Communications.

Splunk report: Majority of european orgs not prepared for cyber-attacks

Splunk report: Majority of european orgs not prepared for cyber-attacks

New Splunk study reveals reliance on outdated technologies is leaving firms vulnerable to breaches caused by malicious insiders and "hapless users".

Two-thirds of used hard drives hold personally identifiable data

Two-thirds of used hard drives hold personally identifiable data

New research from the Blancco Technology Group shows personal data remaining on old eBay and Craigslist hard drives long after they go out of use

9.2 million medical records for sale on darkweb

9.2 million medical records for sale on darkweb

A darkweb marketplace is now advertising nearly 10 million medical records apparently stolen from a large US insurance company

Top 10 cyber-weapons; weaponised IT the preferred attack vehicle once inside

Top 10 cyber-weapons; weaponised IT the preferred attack vehicle once inside

Top ten hacker tools identified - misuse of legitimate tools dominates inside the network.

Microsoft Office 365 hit with massive Cerber ransomware attack, report

Microsoft Office 365 hit with massive Cerber ransomware attack, report

Millions of Microsoft Office 365 users were potentially exposed to a massive zero-day Cerber ransomware attack last week.

Lauri Love suicide fear if sent to US for hacking trials

Lauri Love suicide fear if sent to US for hacking trials

An extradition hearing in London today heard claims that Lauri Love would kill himself if extradited to the US to face trial for allegedly hacking several US federal agencies.

Russia's Duma approves bill requiring decryption backdoors

Russia's lower house of parliament approved sweeping anti-terrorism legislation that requires companies to decrypt any message sent by users.

SWIFT robbers swoop on Ukrainian bank

SWIFT robbers swoop on Ukrainian bank

Yet another bank has been hit via the SWIFT messaging system, this time in Ukraine. This may only be the fifth publically disclosed SWIFT heist, but commentators suggest that there plenty of silent victims

112K French policemen doxxed on Google Drive

A disgruntled ex-employee of an insurance firm uploaded the personal details of 112,000 French police officers to a Google Drive account on June 2, possibly exposing the officer's personal information, including addresses.

Retefe banking Trojan now targeting UK banking customers

Retefe banking Trojan now targeting UK banking customers

Avast Security is reporting that the Retefe banking Trojan is now targeting UK banking customers by redirecting them to fake banking websites.

Malware spawns botnet in 25,000 connected CCTV cameras

Malware spawns botnet in 25,000 connected CCTV cameras

Tens of thousands of security cameras are the newest recruits to an DDoS botnet, noted for its powerful and unrelenting attacks

Features

ICYMI: TeamViewer control; Intel defence; Card cloner; Skype a vector; Cloud apps not GDPR ready

ICYMI: TeamViewer control; Intel defence; Card cloner; Skype a vector; Cloud apps not GDPR ready

The latest In Case You Missed It (ICYMI) looks at TeamViewer hijack; Intel's processor defence; 15 per sec cards cloned; Malware via Skype; Cloud apps not GDPR ready

ICYMI: SC Awards; Lenova flaw; TeamViewer flaw?; ransomware rise

ICYMI: SC Awards; Lenova flaw; TeamViewer flaw?; ransomware rise

The latest In Case You Missed It (ICYMI) looks at SC Awards winners; Flawed app in Lenova; TeamViewer potential flaw; ex-staff with access; ransomware rise continues.

ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack

ICYMI: CEO Sacked; MS Zero-day; Passwords dropped; Ransomware wild, charging hack

The latest In Case You Missed It (ICYMI) looks at CEO whaling victim; Unpatched zero-day; Passwords dropped; Self-propagating ransomware; USB charging hack

Opinion

The five pillars of Network Access Control (NAC) needed to enforce BYOD

The five pillars of Network Access Control (NAC) needed to enforce BYOD

Paul Donovan outlines the main questions to ask when choosing a NAC solution to work alongside a BYOD policy while protecting the network

Email is dead ... Long live malicious email

Email is dead ... Long live malicious email

email is one of the main routes for delivering malware into the enterprise, but despite frequent reports of its demise, it appears here to stay, so companies had better tailor their security posture accordingly says Carl Leonard.

Protecting Your Business Advantage

Protecting Your Business Advantage

Andrew Rogoyski says that companies need to identify what is truly their most sensitive, most valuable data - the thing that would most severely impact the company if stolen or compromised.