Study reveals 48 percent of people will close accounts following a data breach.
Italy is measured and found wanting in a country report produced by the author of the Cyber Readiness Index 2.0 which aims to benchmark the major economies of the world.
An open port linked to remote management software on Eir's D1000 modem router can allow an attacker to take over consumers' networks.
Professor Mark Ryan takes the HP Chair in Cyber Security at the University of Birmingham to explore security issues where the digital and physical world blur.
Cyber-crime growth is accelerating. Rob Wainwright reports how Europol's 2016 Internet Organised Crime Threat Assessment identifies an expanding cyber-criminal economy exploiting our increasingly Internet-enabled lives.
Researchers have uncovered security vulnerabilities in an insulin pump that had the potential to cost lives. SC asks if medical hardware device vulnerabilities are purely a technical problem, or whether a culture of insecurity is to blame...
Information Security Forum managing director Steve Durbin sat down with SCMagazine.com executive editor Teri Robinson to discuss how organisations can better protect their mission critical information assets.
Including fraud in the UK crime figures resulted in online crime overtaking physical crime, now Financial Fraud Action UK (FFA UK) reports that fraud in the payments sector has jumped 53 percent over last year.
Google is refusing to patch an alleged faulty Login Page after an independent researcher claimed to have spotted a bug.
Distributed Denial of Service (DDoS) attacks are on the up according to new research; and the UK is firmly in the crosshairs.
Apple is offering up to $200,000 to researchers reporting critical security vulnerabilities in Apple software, including its underlying operating system.
Steganographic subterfuge: ransomware was already 'a thing', now it's a mature and established business model
New research claims to show that up to three percent of hidden services directories, the backbone of the Tor anonymous router system, have been compromised, which could enable the identification of users in some cases.
Privacy vs security is a contradiction in terms, according to the European Data Protection Supervisor Giovanni Buttarelli who has been reaffirming his opposition to encryption backdoors.
By analysing changes in files, security researchers believe they have discovered a way to detect ransomware in the early stages of encrypting your data.
Private and corporate data are targets for hackers who are focussing their attention on rushed and stressed business people on the move.
Ruthless organised crime is targeting business and its operations need to be disrupted, not just defended against, says a new research report from BT/KPMG which reports that 97 percent of companies have been hit.
Following the announcement on Friday that the country had voted in favour of leaving the EU, commentators have been assessing the impact on UK tech.
Dridex and Locky delivered to victims via compromised computers as the Necurs botnet, dark since late May, starts up again.
A survey of all the ports on the internet is designed to provide decision-makers with the statistical information they need to make informed decisions on engineering the internet - and reveals many, many are open to hackers.
Russian banking malware, Marcher, is headed for the UK in a big way - banks and consumers are urged to be on guard.
CityUK's Cyber Taskforce report, 'Cyber and the City; making the UK's financial and related professional services industry safe from cyber attacks' launched today with former GCHQ head Iain Lobban urging greater data sharing.
As UK government vows to boost cyber-defences, its own research finds majority of successful attacks could have been prevented by adopting Cyber Essentials.
Wearables are the Internet of Things (IoT) devices most likely to emerge as a security threat or cause a breach, according to a new survey by Spiceworks and Cox Business.
Report examines how the direct and indirect economic costs accrue for a hypothetical cyber-attack on the UK's critical national infrastructure.
Two new reports examine the security and privacy threats posed by poor procedures for managing the access rights and network activities of third-party vendors.
Automated attack breaks access system used by Google and Facebook
Researchers have demonstrated how encrypted comms traffic can be used to extract data on users' operating systems, browsers and applications.
First spotted in the wild just a month ago, the Locky ransomware has exploded onto the world's computers and skewered some significant victims.
SC Webcasts UK
Information Security Manager
Infosec People - Hammersmith, West London
Junior Penetration Tester, Hertfordshire, to £35k + benefits
Infosec People - England, Hertfordshire
Cyber Security Architect
CYBER EXECS - London (Greater)
SOC Analyst, Aldershot, £47-56k + package
Infosec People - Hampshire, England, Aldershot
Senior Security Engineer
Loveworklife Recruitment - United Kingdom
Sign up to our newsletters
SC Magazine UK Articles
- Tesco Bank allegedly ignored warnings of hack from Visa
- Investigatory Powers and Digital Economy Bills could threaten economy
- Updated: A million German routers knocked offline by failed Mirai botnet attack
- Gooligan ad fraud malware infects 1.3M Android users, installs over 2M unwanted apps
- Microsoft update left Azure Linux virtual machines open to hacking
- SC Awards Europe 2016 winners announcements!
- ISIS radicalises 'lone wolves' through strong social media presence
- Updated: How will Brexit affect the cyber-security industry in UK and Europe?
- 9.2 million medical records for sale on darkweb
- Microsoft Office 365 hit with massive Cerber ransomware attack, report