This site uses cookies. By continuing to browse this site you are agreeing to our use of cookies. Find out more.X

Latest News

Google chairman sees future of 'unbreakable' encryption

Google chairman sees future of 'unbreakable' encryption

Google chairman Eric Schmidt believes that unbreakable encryption will become reality in 'our lifetime'.

Mobile flaw means 92% of Gmail accounts are hackable

Mobile flaw means 92% of Gmail accounts are hackable

Researchers with the University of California's College of Engineering and the University of Michigan have identified a weakness they believe exists across Android, Windows and iOS operating systems that could allow malicious apps to obtain personal information.

Heartbleed: Still a security risk

Heartbleed: Still a security risk

The Heartbleed security issue may be six months old, but it remains a major problem.

IEEE looks to raise security standards among software developers

IEEE looks to raise security standards among software developers

The Institute of Electrical and Electronics Engineers (IEEE) has formed a new advisory group with the private sector, and is already advising software developers to ensure that their applications are secure.

New Trojan targets 'happy to help' customer service people

New Trojan targets 'happy to help' customer service people

UK and European companies in industries including automotive, finance, energy and telecoms are being attacked by new Trojan malware called 'Carbon Grabber' that steals online banking password and other credentials.

Features

SCADA systems: Riddled with vulnerabilities?

SCADA systems: Riddled with vulnerabilities?

SCADA systems are essential to the smooth running of critical infrastructure but, as evidenced by the Stuxnet attack, they can be exploited through software and hardware vulnerabilities, and human error. But experts contest if they are really under threat.

ICYMI: NSA insiders, hacking living rooms & learning from Target

ICYMI: NSA insiders, hacking living rooms & learning from Target

This week's In Case You Missed It looks at rumours on a new NSA insider, hackable living rooms and if police are turning the tide on cyber-criminals.

The 5 most read articles this week: August 15 to 21

The 5 most read articles this week: August 15 to 21

Here are the five most popular articles, as read by you the reader, in the week for August 15 to 21.

Opinion

How do you stop an Energetic Bear?

How do you stop an Energetic Bear?

Companies must think like a hacker and commit to penetration testing to protect themselves from data breaches, says Chema Alonso.

Is your app secure? Probably not

Is your app secure? Probably not

App vulnerabilities need to be thought about holistically, so the network and database in which they reside also need to be considered says Josh Shaul.

All your vulnerabilities belong to us: The rise of the exploit

All your vulnerabilities belong to us: The rise of the exploit

The growing impact of web exploits isn't just limited to the enterprise market and must be countered on an industry-scale, says Pedro Bustamante.

SC webcasts on demand

This is how to secure data in the cloud


Exclusive video webcast & Q&A sponsored by Vormetric


As enterprises look to take advantage of the cloud, they need to understand the importance of safeguarding their confidential and sensitive data in cloud environments. With the appropriate security safeguards, such as fine-grained access policies, a move to the cloud is as, or more, secure than an on-premise data storage.


View the webcast here to find out more