Latest News

Law firms getting duped out of client funds, warns regulator

Law firms getting duped out of client funds, warns regulator

Solicitors are getting hit by a growing tide of cyber-enabled fraud, resulting in the loss of money and confidential information.

TV5Monde in chaos as data breach costs roll into the millions

TV5Monde in chaos as data breach costs roll into the millions

French broadcaster TV5Monde is still without Internet and other key IT functions three months after a nation-state hacker took control of its TV channels and hijacked social media accounts. Meanwhile, the data breach costs are mounting up.

Features

ICYMI: Visa applications exposed, government backdoors & the Ashley Madison hack

ICYMI: Visa applications exposed, government backdoors & the Ashley Madison hack

This week's ICYMI column looks at the most-read stories on SC this week, including our investigation on VFS Global, the UK government's attitude towards encryption and the continuing fall-out from the Ashley Madison hack.

ICYMI: 'Sophisticated' ransomware, RIP Flash & hacking Tour de France

ICYMI: 'Sophisticated' ransomware, RIP Flash & hacking Tour de France

This week's 'In Case You Missed It' column looks at the five most-read articles on SC this week, from the intricacies of ransomware and the supposed death of Adobe Flash to hacking a professional cycling team.

ICYMI: Tor sniffing, router bugs and Hacking Team fallout

ICYMI: Tor sniffing, router bugs and Hacking Team fallout

This week's ICYMI column looks at Tor sniffing, old-school router attacks and the fallout from the Hacking Team data breach.

Opinion

Top of the app charts - Shuabang: automated malware made in China

Top of the app charts - Shuabang: automated malware made in China

Shuabang companies in China sell installs and user ratings to app developers to help boost their profile, which is leading to new forms of malware, says Chema Alonso.

Putting people at the heart of your IT policy: Five tips to get it right

Putting people at the heart of your IT policy: Five tips to get it right

IT security policies must evolve to embrace sensible policies for bring-your-own-device (BYOD), says Chris Mayers.

The future of password managers

The future of password managers

Despite the LastPass security breach, password managers are still the most realistic method for ensuring we all use strong passwords, says Bill Carey.