This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Latest News

Shellshock: Millions of servers under attack

Shellshock: Millions of servers under attack

In the wake of Shellshock, end-users and security managers race to patch web servers and desktops, but may be forgetting vulnerable embedded devices.

Londoners agree to give child away in return for free WiFi

Londoners agree to give child away in return for free WiFi

Hundreds trapped and exposed by fake 'poisoned' WiFi hotspot.

The UK a top target for phishing attacks

Cybercrime-as-a-service the new criminal business model

Cybercrime-as-a-service the new criminal business model

A new report from Europol's European Cybercrime Centre (EC3) reveals that cybercrime is being increasingly commercialised, and by criminals who use legitimate services to hide their activities.

Features

ICYMI: Shellshock attacks, cyber Armageddon and unpredictable hackers

ICYMI: Shellshock attacks, cyber Armageddon and unpredictable hackers

This week's In Case You Missed It column looks at the first attacks resulting from the Bash/Shellshock bug, claims of cyber Armageddon and unpredictable hackers.

ICYMI

ICYMI

This week's In Case You Missed It (ICYMI), China's industrial spying; US extra-territorial claims; SANS event; Card hacks increase; Malvertsing growth; staff data-theft criminal; Biometric smartphones up tenfold; Celebgate hits cloud; Kids, weakest link; Women's Security Society event; Kyle and Stan hit millions.

Cloud computing hit by 'Celebgate'

Cloud computing hit by 'Celebgate'

Enterprises are questioning their cloud strategy after Apple's iCloud service was implicated in the leak of nude celebrity photos. But should one bad Apple spoil the bunch?

Opinion

Throwaway tablets threaten our children

Throwaway tablets threaten our children

Used and broken Android tablets often retain access to passwords even when wiped - so be careful how you dispose of them says Ken Munro.

Wearable technology: A secure approach to business

Wearable technology: A secure approach to business

Wearable technology raises many of the same concerns as smart phones and USBs - recording, storing and transmission of data by individuals - and your security policies should include that risk says Paul Martini.

How choosing your own device (CYOD) can help empower your workforce

How choosing your own device (CYOD) can help empower your workforce

If implemented well, choosing your own device (CYOD) brings benefits beyond BOYD or company-imposed mobile devices says David Brady.

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more