Cyberattacks related to compromised managed service providers see upswing; even though you rely on an MSP or managed security service provider, you are still culpable for the information that you own.
Universal clipboard feature in iOS14 exposes how apps snoop on smartphone users, with LinkedIn found copying clipboard content from iOS devices with every keystroke.
Urgent patching advised following vulnerability found in configuration interface of the BIG-IP delivery controller used by some of the world’s biggest companies, governments, & enterprise networks.
Forty-six makes of router haven’t had a security update in a year leaving employees open to attack
The absent are always wrong. Being present and visible at the scene of an incident is as important as what you do when you get there says Sir James Bevan in his Top Tips for incident management.
Missing the wood for the trees. Those with large numbers of tools must make sure the staff, expertise, and proper organisational alignments, expectations, and structures are in place.
Women can be set up for failure if they have not got the qualifications and experience to perform the role, and then are not supported. WFH requires more support & flexibility to have a life and do a job.
Keynote speaker for SC Media UK's digital congress, NATO Cyber Security Centre chief Ian West tells delegates about how the agency faced the challenges posed by the Covid-19 pandemic.
CISOs from Microsoft, Aldermore Bank and EY joined the SC Magazine Virtual Conference in a session called CISO panel discussion: leadership lessons and best practice in unprecedented times.
A second chance to catch up on the expert presenters, panelists and demonstrators on staying secure in the new normal - including a candid update on how Nato's cyber command coped in Europe.
Windows Remote Desktop Protocol gets hit hard by hackers seeking to take advantage of employees working from home.
The 30-year-old legislation is out of date, a coalition of cybersecurity experts and industry leaders tells the UK's Prime Minister Boris Johnson.
IT professionals are struggling to keep pace with the increased demands brought on by a massive increase in remote working, according to research from ManageEngine.
The ‘Inside the mind of a hacker’ cyber report from Bugcrowd also says that 78 per cent of hackers believe they will outperform AI for the next decade.
The Suspicious Email Reporting Service has received more than a million reports of scam emails, National Cyber Security Centre announces.
A large European bank suffered a huge DDoS attack earlier this week, according to a new report by Akamai. The attack was massive and quick.
GDPR has achieved many of its aims and been the biggest driver of cybersecurity spend, online safety and privacy, but it's not been without challenges in implementation, not something the EU dwelt upon.
‘Invisible god’ of networks: Comprehensive report analyses full impact of underground cyber heavyweight Fxmsp
Group-IB, a Singapore-based cybersecurity company, issues a comprehensive report on infamous seller Fxmsp who made a name for himself selling access to corporate networks.
Industry experts express concern as Twitter emails business clients to admit personal data like email addresses have potentially been compromised.
Online shops in Europe, US and South America compromised by attack using Google Analtics to bypass CSP - more barries advised.
This free, interactive Periodic Table of DevOps Tools quickly shows many of the leading tools and where they fit in the software delivery landscape.
The Cybersecurity Exposure Index (CEI) calculates the level of exposure to cybercrime by country from high to low with Afghanistan the most vulnerable and Finland the least.
‘Dangerous to speculate’ over state-based cyber-attack on Australia without evidence and threat intelligence
Experts have warned of the dangers of jumping to conclusions after Australia's Prime Minister Scott Morrison confirmed government and institutions were targeted.
Nearly 20 zero day vulnerabilities in TCP/IP library, including critical vulnerabilities in the DNS protocol, could result in remote control of devices - impact, magnified by supply chain dissemination
Hackers could use D-link router flaws to exfiltrate data and upload malware
Government cyber initiatives: £10m to secure tech; trade strategy; funded AI conversion courses - uni list
Government cyber initiatives: £10m in grants for cyber tech to secure tech; trade strategy to promote cyber & tech experts; 2,500 AI conversion courses, some funded, promote diversity, Unis listed here.
A combination of sophisticated techniques and copy-paste tactics are being used by cybercriminals, along with legitimate tools, in-depth research from Sophos about botnet Kingminer demonstrates.
The crosshairs from the ‘guns for hire’ Dark Basin group fell on senior government officials, advocacy groups, journalists and hedge funds around the world.
Twice entangled: Fake ransomware decryptor encrypts victims’ files again; Honda victim of ransomware
Bogus Stop Djvu lures people with the promise of getting their encrypted data back then delivers another ransomware. Honda falls victim to ransoware - Worm tech approach suggested.
Hackers using point-of-concept exploit code for the highly critical “SMBGhost” bug - aka EternalDarkness - that Microsoft patched in March in its Server Message Block 3.1.1 (SMBv3) protocol
Businesses face new cybersecurity risks with almost half of assets obsolete or ageing compared with just three years ago.
Some 80 percent of UK consumers believe organisations should refuse to pay ransoms, but still hold companies financially liable for their personal data, a Veritas Technologies report shows.
Last week Cisco Systems released a series of security advisories addressing a total of 47 vulnerabilities, including three critical bugs that were found and fixed in IOS or IOS EX software.
Google has introduced multiple security fixes for the desktop edition of its Chrome browser and Mozilla has also done the same for Firefox and Firefox Extended Support Release.
Two of the world’s biggest tech giants collaborate to support hardware security keys and devices that generate unique cryptographic keys.
The final winners of the SC Awards Europe announced today, Thursday 4th June, culminating in the Awards for Best Security Company, Outstanding Contribution and for CISO of the year! ....
Join us today, Thursday 4 June at 4pm BST, for the final day of the SC Awards Europe 2020. Winners & highly commended will be announced in SC's digital awards event for the following categories:..........
A new Cyber Regiment - The 13th Signal Regiment - has been launched to protect frontline operations from digital attack Defence Secretary Ben Wallace today announced today.
Researcher reports Apple paying a US$ 100,000 (£80,000) bug bounty for finding a vulnerability in its Sign in with Apple feature, as three apps in Apple’s App Store found to be 'fleeceware.'
Half of UK remote workers use unmanaged personal devices to access corporate systems; many re-use passwords, & let family use corporate devices - putting critical business systems & data at risk
Today's winners at the online SC Awards Europe 2020 celebrated in style - so far as they could in their kitchens and attics - sharing their win with friends and colleagues.
Join us again today, Wednesday 3 June at 4pm BST, day two of the SC Awards Europe; the winners and highly commended will be announced in SC's digital awards event for the following categories:...
Autonomous cars face new cybersecurity checks to provide oversight, stability and transparency when it comes to creating processes and protocols during product development.
Today, Tuesday 2 June at 4pm BST, the first day of the SC Awards Europe, the winners and highly commended will be announced in SC's digital awards event for the following categories:..........
Congratulations to all the winners at the SC Awards Europe 2020 announced today; the reveal is over three days in an online ceremony continuing Wednesday 3rd and Thursday 4th.
Asked why he robbed banks, bank robber Willie Sutton quipped, "because that's where the money is." Now healthcare's the target & cybercrimals might well respond, “because that’s where the data is.”
Government-backed project by telecoms and tech giants develops cybersecurity blueprint for self-driving cars at a critical time with projected growth worth £28 billion expected by 2035.
StrandHogg 2.0 flaw enables hackers to hijack almost any app on an Android phone.
A deep dive into this key industry report looks at the conclusions drawn from 32,000 security incidents and 3,950 confirmed breaches from 81 countries. Experts give their takeaways.
Ethical hackers on the HackerOne platform are reported to have earned a cumulative US£100 million finding and reporting vulnerabilities through bug bounty programmes.
Is Zero Trust really achievable given the complexity in finance service organisations?
Brought to you in partnership with Forescout