Latest News

BitTorrent moves to patch reflective DDoS attack flaw

BitTorrent moves to patch reflective DDoS attack flaw

Vulnerable libuTP protocol could have been used to force torrent apps to send malicious traffic

Dark website Agora closes over Tor vulnerability suspicions

Agora, one of the largest online black market sites, halted operations after concerns arose of vulnerabilities in Tor's hidden services.

ISIS hacking leader killed by drone strike

ISIS hacking leader killed by drone strike

The alleged leader of ISIS' CyberCaliphate hacking group, Junaid Hussain, is believed to have been killed in a recent drone air strike

Features

ICYMI: Adblock threatens OSX; Thomson customers exposed; AM leaker 'a woman'; AM police call on white hat help; Malaysia cyber alert

ICYMI: Adblock threatens OSX; Thomson customers exposed; AM leaker 'a woman'; AM police call on white hat help; Malaysia cyber alert

In this week's In Case You Missed It (ICYMI): Adblock Plus weakens Mac OSX ? Thomson breach exposes hundreds; Madison insider a woman says McAfee - police call for 'white hat' help; Cyber-attack alert in Malaysia.

ICYMI: Big data leaking; Salesforce vulnerability; suppressed car hack; sound authentication and critical IE fix

ICYMI: Big data leaking; Salesforce vulnerability; suppressed car hack; sound authentication and critical IE fix

In this week's In Case You Missed It (ICYMI): Big data leaking; Salesforce vulnerability patched; suppressed car hack; ambient sound authentication and critical IE fix.

Sound Proof: new two-factor authentication through ambient noise

Sound Proof: new two-factor authentication through ambient noise

Second authentication tier is proximity of user's phone to login device

Opinion

Pre-empt the regulations and safeguard your data NOW!

Pre-empt the regulations and safeguard your data NOW!

Take steps now to protect your data ahead of changes to the General Data Protection Regulations in Europe, says Andy Hardy.

Sun, sea and shadow IT

Sun, sea and shadow IT

Chris Mayers provides warnings and advice for firms to help them stay safe as more workers log on when on holiday.

Privileged identities are at the core of today's cyber attacks

Privileged identities are at the core of today's cyber attacks

Given the difficulty of preventing them, we should focus instead on minimising the damage from cyber-attacks, says Philip Lieberman.