This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Latest News

Password recovery made too easy

Password recovery made too easy

A senior malware analyst has slammed the availability of a `password recovery' utility from Freehostia, noting that the software actually uses network admin utilities to take credentials from the users' PC.

Belgacom says alleged GCHQ APT attack cost firm £12 million

Belgacom says alleged GCHQ APT attack cost firm £12 million

One year on from a nation-state APT which infected 26,000 machines across 124 systems at telecom operator Belgacom and the firm has detailed the cost and manpower involved in the clean-up operation.

CryptoWall compromises 40,000 UK citizens

CryptoWall compromises 40,000 UK citizens

Research just published claims to show that ransomware - in the shape of CryptoWall - is still generating healthy volumes of income for the cyber-criminals behind the code.

Microsoft pulls Windows 7 and Windows Server 2008 elements of Patch Tuesday

Microsoft pulls Windows 7 and Windows Server 2008 elements of Patch Tuesday

Microsoft has unexpectedly withdrawn a key element of its Patch Tuesday operating system refresh after discovering a flaw in an update for Windows 7 and Windows Server 2008.

Black market data trading at an all-time high

Features

Control systems are under attack: 4SICS

Control systems are under attack: 4SICS

Control systems are visible on the internet and under attack from dedicated malware, but vendors are not providing adequate security.

ICYMI: Poodle, hacking smart meters and spending big on cyber security

ICYMI: Poodle, hacking smart meters and spending big on cyber security

This week's In Case You Missed It column looks at a new SSL flaw, attacks on smart meters, FBI's problem with phone encryption and the bank that is spending £310 million on cyber security.

ICYMI: GCHQ transparency, data trust and the Snapchat hack

ICYMI: GCHQ transparency, data trust and the Snapchat hack

This week's In Case You Missed It column looks at concerns around data trust and transparency, and the latest serious data breach at one of the biggest technology start-ups.

Opinion

Women in cyber security: Changing pathways and perceptions

Women in cyber security: Changing pathways and perceptions

Security consultant Dr Jessica Barker says that the next step to getting more women into cyber security hinges on changing minds and career pathways.

Zeroing in on zero-day vulnerabilities with looping

Zeroing in on zero-day vulnerabilities with looping

Zero-day vulnerabilities are a fact of life in cyber-security, which is why looping is so essential, says Darren Anstee.

Humanise outsourcing with a Pay As You Go CISO

Humanise outsourcing with a Pay As You Go CISO

Outsourcing your CISO is an option medium sized organisations should consider says Carl Shallow, who advises a Pay As You Go model to buy in expertise.

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more