A new botnet has been discovered by security researchers that has anti-virtual machine capabilities to evade security controls such as a sandbox.
DNS is inherently vulnerable. However, when correctly implemented with hardened appliances, securely managed, it can also be an organisation's best weapon in securing its networks.
Software-Defined Enterprise Content Delivery Networks (SD ECDNs) are virtual networks that allow businesses to share large files - like upgrades - at high speeds, regardless of whether they use legacy network infrastructures.
It's rare that CISOs have a horizontal view across their controls to know where to focus their resources for best overall effect which is why Nik Whitfield says agile analytics is a core capability that security teams already require today.
In our connected society, securing the network "hive" is very much a team effort. Only by assessing and defining the landscape in the first instance can a successful security strategy be put in place says Russell Crampin
The masters of one of the world's most prolific pieces of adware have been arrested in a crackdown by Beijing police.
An attack on Italian bank, UniCredit, has led to the accounts of 400,000 loan customers being accessed.
Abeer Khedr has been the Information Security Director at National Bank of Egypt (NBE) since 2010. Since its birth in 1898 with a capital of £1 million, NBE is regarded as one of the oldest and most respected commercial banks in Egypt. SC's Ali Taherian caught up with Khedr to talk about some of the specific problems and solutions she deals with day to day.
Charities are being targeted by cyber-criminals but many are still unaware of the main threats facing them. Martyn and Valerie Croft undress some of the challenges facing charities today....
Lloyd's of London has come through with a new report that will provide great clarity to cyber insurers
An insider has compromised health insurance company BUPA, exposing the records of 547,000 customers.
A Verizon third party vendor's misconfiguration a storage repository left the data of a potential six million customers out in the open last month.
A new kind of mobile ransomware has been found lurking on the Google Play Store.
Garry Kondakov discusses why it is so essential to be able to identify new threats in a world where the attackers are so innovative.
Kirsten Bay argues that by switching to a detection-led approach, CISOs can focus less on ensuring every machine on their network is updated, and more on spotting the attacks once they have penetrated the perimeter.
Though the AA's shop was reportedly leaking payment card data, the motoring association did not alert customers.
Jay Chaudhry discusses why in the aftermath of WannaCry, our concept of the network has to change.
Security researchers have found yet another SQL injection vulnerability in a WordPress plugin.
Microsoft has cast doubt on a CheckPoint report earlier this month which said that a piece of adware has infected nine percent of networks globally.
Researchers at Trend Micro have traced three campaigns targeting government and high profile private sector targets to one group they have dubbed BlackTech.
A new report from EfficientIP reveals a lack of awareness as to the variety of DNS attacks, a failure to adapt security solutions to protect DNS and poor responses to vulnerability notifications among businesses worldwide.
National Grid spokesperson tells SC "gas and electricity networks are isolated from our everyday business systems to ensure our networks remain safe and reliable."
Following the theft and attempted sale of login details believed to belong to MPs, peers and parliamentary staff, Parliament has confirmed it has seen "unauthorised attempts" to access "less than one percent" of those accounts.
Clinton's presidential election campaign manager, Robby Mook, told a crowd in London about his experience of 'election hacking.'
Subhalakshmi discusses the most common misconceptions about network security, that often cloud an organisation's judgment when it comes to protecting their IT assets.
A declassified report has slammed the NSA for not fully implementing the recommendations given to the agency after the Snowden leaks.
Wandera researchers spotted an app designed to keep users physically safe putting users at risk by leaking their information.
For a more connected workplace, trusted identities can help organisations take a first step towards integrating building systems by securing, customising and enhancing IoT applications.
The massive Mirai distributed denial of service (DDoS) attack that took down Dyn DNS last fall knocking out dozens of high-profile websites could have been much worse if the malicious actors had done a bit more research.