Unsigned firmware computer accessories used by major manufacturers could allow hackers to plant malware stealthily
CISOs across the world expect cyber-security talent shortage to worsen; 66 percent struggle to recruit senior talent, says survey
Increasingly tech needs to be coupled with an ability to see the big picture, strategise and articulate problems and potential solutions to policy makers - which is where the Cyber 9/12 Challenge comes in.
A survey by Egress says 97 percent of respondents listed insider data breaches are a major point of worry
Armed forces veterans trained in penetration testing to target cyber-security skills gap
Email-based extortion scheme targets website owners serving banner ads through Google AdSense
Despite the harm data breaches do to business reputation, several UK enterprises remain alarmingly unprepared in cyber-defence, even complacent
A slew of flaws have been found that could affect devices running the Bluetooth Low Energy (BLE) protocol.
OS updates happen continuously and security demands constant change, but compatibility issues make OS migration a headache for most IT pros
Czechs authorities bounce into action, start an investigation after the disclosure that cyber-security company Avast had harvested customer data before selling it onto other firms.
The Labour Party faces GDPR penalties as party MPs are accused of misuse of membership data and party systems
Today is the final day for entries to this year's SC Awards Europe 2020, and while you won't be alone in leaving it to the last minute, time really is running out - so if you are going to enter, do so now.
You've got to be in it to win it - so get your entry to the SC Awards Europe 2020 submitted ASAP - demonstrating why your customers love your product or service
Swiss firm Crypto AG was used by the intelligence agencies of Germany and the US to spy on foreign governments for decades - while they paid for the privilege.
Flaw in Windows-based troubleshooting program SupportAssist, pre-installed on nearly every new Dell PC
New Metamorfo trojan targets 32 financial institutions and bitcoin transactions, marks escalation in ongoing campaign
US Justice Department held four members of China's People's Liberation Army responsible for the Equifax data breach
CISOs at end-user companies don’t pay to enter the SC Awards Europe CISO of the year. Three days left to enter.
The personal information of all Israeli voters was available online, after PM Netanyahu’s Likud party uploaded the full register on election campaign management app Elector
Ransomware operators have started using legitimate, digitally signed hardware drivers to delete security products from targeted computers
Midnight on Thursday entries to the SC Awards Europe 2020 will close. Get your entry in now so that you are in with a chance to celebrate your due recognition at the June Awards night.
Hackers modified Emotet Trojan to spread through unprotected wireless networks
Ransomware operators change operation and extortion tactics including using Active Directory domain controllers to spread the ransomware and publicly naming victims
Phishing campaign specifically targets users of Android devices to deliver Anubis, a malware that was originally used for cyber-espionage, now retooled as a banking trojan
With just six days to go until the SC Awards Europe final submission date of midnight 13 February, all potential winners with uncompleted entries are advised to finalise your entry as soon as possible.
Security professionals tasked with implementing zero-trust systems admit lack of confidence in their ability to apply it to the organisational security access architecture
There are just seven days to go before entry to this year's SC Awards Europe close - so if you are still considering entering but haven't submitted your entry - its time to get a move on or you'll miss out.
A hotline for businesses hit by cyber-crime is to be launched by the NSCC by March next year to make it easier for companies to report online crimes.
Unit 42 Cloud Threat Report uncovers 199,000 insecure cloud templates, finds 43 percent of cloud databases unencrypted.
Multiple WhatsApp vulnerabilities could aid phishing campaigns and ransomware
Compensation was paid to most (71 percent) organisations hit by a supplier-related data incident if they had specific data usage guidelines for partners and subcontractors
Global malware attacks fell for only the second time in five years, dropping six percent to 9.9 billion, down from 10.5 billion, but there are rises in more stealthy attacks including encrypted threats up 27%
The Israeli company CyberArk belongs to the growing pack of private cyber-security companies that has chosen to avoid takeover offers and build its own business
Using cleaners to gain physical access and insert USBs into computers, criminal gangs are reverting to old school techniques - and they still work, police head tells delegates.
The hackers behind Trickbot have added a new Windows 10 UAC bypass to the malware to in order to execute code without the victim knowing.
This infographic provided by CurrentWare shows key reasons why remote workers are so vulnerable to cyber-security threats and provides actionable tips to help accommodate remote workers safely.
The Swiss multinational investment bank and financial services company started phasing out passwords from the identification and access system for its customers and employees
Diana Kelley, cyber-security field CTO at Microsoft, listed the seven habits of highly trusted cloud providers at Cybertech Tel Aviv
More than a million passengers’ details have been extracted from an unencrypted database backup of Indian airline operator SpiceJet.
An annual mass survey of the diversity of talent working in cyber-security - encompassing all staff currently in the sector - launched by the National Cyber Security Centre (NCSC) and KPMG UK.
Security researchers have discovered a vulnerability in a WordPress plugin that enables attackers to forge a request on behalf of an administrator and inject executable code on a vulnerable site.
Simply the best? - then let everyone know. Don't miss out on your chance to enter the SC Awards Europe 2020 - Get your entries in by our final deadline: Thursday 13 February - Midnight GMT.
DMA attacks enable attackers to read & write memory off a victim system directly, bypassing the main CPU & OS. Using Dell and HP laptops, researchers found two different vulnerabilities, now mitigated.
The UK’s cyber security industry is now worth an estimated £8.3 billion, with total revenues in the sector up 46 percent from £5.7 billion in 2017 says DCMS UK Cyber Security Sectoral Analysis 2020 report.
CEOs are increasingly concerned about sophisticated cyber attacks on their own companies with four-in-five executives fearing cyber-attacks on their own company modifying their own online behaviour.
EU announces guidelines that its 28 member countries can restrict or ban high-risk 5G vendors from core parts of their telecoms networks, and are advised to use multiple suppliers, following UK lead.
The government today confirmed that it will allow Chinese manufacturer Huawei to help build the country’s 5G network - with restrictions - in defiance of US objections,
IoT networks using the LoRaWAN protocol are often insecure, according to researchers, due to a range of encryption issues and poor configuration choices.
Building & ensuring trust are recurrent themes from our commentators, which also include education, awareness, going beyond compliance, implementing best practice, & a host of other concerns.
Is Zero Trust really achievable given the complexity in finance service organisations?
Brought to you in partnership with Forescout