Latest News

Cryptowall has been a cash bonanza for criminals, failure for cops

Cryptowall has been a cash bonanza for criminals, failure for cops

Though dubbed the most successful malware in history Cryptowall can be stopped

AlienSpy returns as cross-platform backdoor

The AlienSpy remote access Trojan has evolved into a cross-platform backdoor that affects Windows, Linux, Mac OS X and Android operating systems.

Malware Museum opens

Kaspersky confirms return of Carbanak and two more banking APT groups

Kaspersky confirms return of Carbanak and two more banking APT groups

Kaspersky has confirmed the return of Carbanak as Carbanak 2.0 and uncovered two more groups working in the same style: Metel and GCMAN.

UK's most recession proof occupations are in technology

Due to the increasing demand of technology across the UK, IT jobs have survived the economic crisis better than any other profession.

Features

Predictions: 2016 and beyond

Predictions: 2016 and beyond

Industry predictions for cyber-security are unlikely to achieve a consensus, but they do provide plenty of insights and recurring themes that serve as indicators of future trends, as the following edited forecasts reported by Tony Morbin demonstrate

Silver linings while clouds gather

Silver linings while clouds gather

There's no denying that cloud adoption is growing at a tremendous pace, along with a subsequent expansion of the threat landscape. Keeping mountains of data from numerous organisations on a third-party's servers might be a scary prospect for the security minded. But, Max Metzger asks, should we be worried?

Do your data policies stand up to scrutiny?

Do your data policies stand up to scrutiny?

Most companies are not ready or able to comply with the proposed new Data Protection Regulations, reports Roi Perez, while ignoring them is not an option given the prospect of heavy fines of up to €20 million

Opinion

Five cyber-security trends to watch

Five cyber-security trends to watch

Dr Adrian Davis shares his top EMEA technology and security trends to watch this year including changing consumer expectations of data use and privacy as its value becomes apparent.

Into the Mind of a RAT operator

Into the Mind of a RAT operator

Both Dyre and Dridex Trojans now use a combination of local redirection and RAT to effectively escape detection by current anti-fraud and security tools, but Uri Rivner says real-time behaviour analysis can still spot the bad guys.

Video: Building blocks of IT security 1 - Establishing the requirement

Video: Building blocks of IT security 1 - Establishing the requirement

In instalment one of his four-part viewpoint series, Tony Collings outlines the first of his essential building blocks for the successful implementation of an IT project: have you got the business requirement right?