Latest News

Google researcher finds serious flaw in Avast secure browser

Google researcher finds serious flaw in Avast secure browser

Google says Avast introduced a serious security hole when it created its Avastium secure web browser from a Chromium fork.

Brazilian companies being targeted by malicious spam campaign

Symantec has discovered a spam campaign targeting Portuguese-language computers specifically focusing on companies based in Brazil with the goal of stealing email accounts to access sensitive corporate information.

Robin Who? Dridex botnet replaced with antivirus software

Robin Who? Dridex botnet replaced with antivirus software

A mysterious Good Samaritan has replaced the code on certain parts of the villanous Dridex botnet with Avira Anti-virus installers.

Clean house to keep WordPress infection from coming back again and again

Clean house to keep WordPress infection from coming back again and again

Malware keeps re-infecting sites and installing multiple backdoors in WordPress websites, according to a researcher from Sucuri Security.

Features

Predictions: 2016 and beyond

Predictions: 2016 and beyond

Industry predictions for cyber-security are unlikely to achieve a consensus, but they do provide plenty of insights and recurring themes that serve as indicators of future trends, as the following edited forecasts reported by Tony Morbin demonstrate

Silver linings while clouds gather

Silver linings while clouds gather

There's no denying that cloud adoption is growing at a tremendous pace, along with a subsequent expansion of the threat landscape. Keeping mountains of data from numerous organisations on a third-party's servers might be a scary prospect for the security minded. But, Max Metzger asks, should we be worried?

Do your data policies stand up to scrutiny?

Do your data policies stand up to scrutiny?

Most companies are not ready or able to comply with the proposed new Data Protection Regulations, reports Roi Perez, while ignoring them is not an option given the prospect of heavy fines of up to €20 million

Opinion

Video: Building blocks of IT security 1 - Establishing the requirement

Video: Building blocks of IT security 1 - Establishing the requirement

In instalment one of his four-part viewpoint series, Tony Collings outlines the first of his essential building blocks for the successful implementation of an IT project: have you got the business requirement right?

Four key predictions for enterprise security in 2016

Four key predictions for enterprise security in 2016

The threats faced and intelligence needed in enterprise security is always changing and the organisations that stay on top of these trends will be best placed to handle whatever comes their way says Mark Hughes.

Secure Shell (SSH) the key to the post-password world

Secure Shell (SSH) the key to the post-password world

The humble password is often seen as obsolete and ineffective. David Howell suggests that Secure Shell (SSH) key technology has several key advantages and can help to deliver the post-password world.