Black Friday has kickstarted the pre-Christmas holiday shopping spree, leaving businesses wary of possible online scams and cyber-attacks
Half of Oracle EBS customers have not patched critical payment system vulnerabilities in Oracle E-Business Suite - with a CVSS score of 9.9 out of 10, these these vulnderabilities are very high-risk indeed.
What happens when people receive an actual, legitimate email that accidentally looks like a phishing scam?
Intezer researchers spot Windows variant of ACBackdoor, which is primarily a Linux malware
Researchers discover a bug in Google and Samsung phones that literally spies on its users
Redmond giant Microsoft has joined Google and Mozilla in support of DNS over HTTPS (DoH), promising upcoming integration of DoH into Windows 10: business visibility concerns rise
Misconfigured legacy database of game publisher Wizards of the Coast expose information of hundreds of thousands of online gamers
Various initiatives across the globe have the common goal of supporting women in cyber-security. They often include education, training, networking, mentorship, and socialising, among other offerings.
Ohio State University academics discover a design flaw in low-powered Bluetooth devices that leaves them susceptible to hacking
Partnership model overcomes wariness at CSC19 Monaco; SASIG's Martin Smith doubles quota, to 'make 10 new friends': Mark Walmsey, CISO at Freshfields discussing digital transformation.
Researchers find that the UK Home Office's Brexit Android app lacks basic security, allowing hackers to steal passport information and facial IDs
Security researchers find vulnerabilities in the supposedly impenetrable 'secure world' storage vault in Android phones that could allow access to payment credentials
The nature of resilience was discussed and responsibility and accountability were tackled with a consensus that it rested primarily with the board, but each player had to be accountable for their own role.
VMware pushes out security updates covering five vulnerabilities that, if exploited, could lead to information disclosure or a denial of service situation
A bug in the latest version of Facebook's iOS app opens iPhone cameras as users peruse their feeds
Google and health care provider Ascension confirm a amassing data of roughly 50 million patients
Microsoft issues updates covering 74 vulnerabilities, 13 of which were critical
Intel platform update covers 77 vulnerabilities, two of which were rated critical
In cooperation with Bonnie Butlin of WISECRA, SC Media UK is delighted to announce the 50 leading European* Women in Cyber-security for 2019. *Excludes UK which has a separate list, link below.
Firewall automation might be in the headlines, but enterprises are struggling to make sense of the opportunity on the ground, potentially leading to increased security risk, according to a new report
SC Media's 2018 Women in Security print issue took home first place in Folio Magazine's Eddie & Ozzie Awards for best B2B magazine covering technology/telecom
Since August 2019, no other WordPress-targeting malware has yielded a higher rate of new infections than WP-VCD
Researchers find 49 adware-laced Android apps that were downloaded more than three million times; apps removed from Google Play
Contestants at the Pwn2Own Tokyo 2019 take down an impressive number of high-profile products during the competition's first two days
No single actor has the resources to protect markets from cyber-threats on their own, as a recent global cyber-security resilience test demonstrates
Bugcrowd's weekly bounty for white-hat hackers crosses £391,000
Microsoft confirms ongoing BlueKeep exploit; teams up with security researchers who initially spotted the attack
Amazon's Ring Video Doorbell Pro has been exposing the Wi-Fi network credentials of houses in which they were installed
A hardware vulnerability can have significant impact on software security as most software was designed around assumptions present in the hardware and subsequently compiled for a given hardware platform.
Google announces App Defence Alliance, a collaboration of the search giant and three cyber-security firms to vet apps prior to being placed in the Google Play Store
Zurich Insurance has rolled out new industry-specific endorsements to its cyber-insurance policies to provide coverage for manufacturers
Trend Micro was the target of an insider threat that saw information on 68,000 of its customers being stolen, sold and used to make scam phone calls
In the UK, the current cyber-security workforce estimate is 289,000, with 121,000 in France and 133,000 in Germany. The shortage of skilled professionals across EMEA has grown to 291,000.
For the last 18 months, some of Facebook's developers have had access to private user information contained within some of the social media site's groups
Google patches Android bug that could allow attackers to transfer a malicious application to a nearby NFC-enabled device
Admins are warned over pirate WordPress plugins that infect sites with malware - rogue software that harbours WP-VCD malicious payload.
SC Media UK's 50 most influential women in cyber-security discuss the practical steps that organisations should be taking to overcome a lack of diversity in the sector.
Multiple, uncoordinated Magecart attacks have been skimming credit cards from sites at the same time
Traders exploiting glitch in the Robinhood Markets Inc. system to excessively tap borrowed funds to trade stocks
New Capesand exploit kit, possibly derived from an older EK, is being used to take advantage of Internet Explorer and Adobe Flash vulnerabilities
SC is delighted to honour & recognise the 50 women who, in our opinion, have had the most influence in the UK cyber-security sector over the past year as role models or campaigners.
Stephanie Carruthers, chief people hacker with the IBM X-Force Red offensive security services team, explains the common security mistakes by companies and employees
Google has fixed two high-level vulnerabilities in Chrome, including one that mysterious attackers have been exploiting in a malicious campaign dubbed Operation WizardOpium
Researchers discover a BlueKeep campaign, months after Microsoft disclosed that millions of Windows devices harboured the hackable flaw
Security researchers have warned that XML macros embedded in SYLK files can evade defences in Microsoft Office for Mac and can't be disabled.
As part of a review launched today you are invted to tell the government what steps, including incentives and regulations,will encourage the leaders of UK organisations to take cyber-security seriously.
Are we saying we just want women in cyber for the sake of it? I've nothing against bringing more women in sales, marketing, or admini, but it's not what we need. What we are lacking is technical skills.
Information Commissioner Office, UK, demands new statutory code to oversee the police use of 'invasive' facial recognition technology
Malware deployed by the Chinese hacking group APT 41 monitors SMS traffic and other mobile information en masse to target specific customer phone numbers
Popular keyboard app rings up millions of dollars in fraudulent charges by secretly making premium purchases on a targeted device
Is Zero Trust really achievable given the complexity in finance service organisations?
Brought to you in partnership with Forescout