Please turn on your JavaScript for this page to function normally.
Human element of security to the fore at IRISSCON 2015

The most neglected part of security is the human factor – and yet it’s also the most vulnerable. Several of the speakers at the recently held IRISSCON cyber crime conference …

Telegram Android app is a stalker’s dream

Popular instant messaging service Telegram provides optional end-to-end encrypted messaging and, in general, is highly focused on protecting user privacy.Despite these …

Top malware families targeting business networks

Check Point has revealed the most common malware families being used to attack organisations’ networks during October 2015. They identified more than 1,500 different malware …

CISO at U.S. Bank offers tips for secure online purchasing

The thrill and chaos of holiday shopping has started, and unfortunately with that comes the inherent risk of fraud. With an increased threat of digital fraud, what can …

How UK businesses plan to tackle security threats in 2016

81% UK IT decision makers experienced some sort of data or cyber security breach in their organisation in 2015, according to training company QA. 66 per cent said that the …

Week in review: Dell computers shipped with root CA cert and private key, analytics services tracking users via Chrome extensions

Here’s an overview of some of last week’s most interesting news and articles:Four ways an attacker can infiltrate an organization by diverting security …

Production freeze: Prevent, detect, correct

As we enter the Christmas shopping season, many retail organisations go into a “production freeze” where they halt updates and configuration changes in their payment and order …

Five big technology predictions into 2016

1. Security will be the biggest issue in the ICT industry driven by rapid adoption of Cloud, Mobility and the Internet of Things As platforms become more open due to the rapid …

Linux crypto ransomware continues to wreak havoc, but there’s some good news

Trojan Encoder crypto ransomware family, whose main target are web servers running on Linux, is obviously making quite a splash. Dr. Web, the security company that first …

GPS faker software broadcasts spam across thousands of fake profiles

Different from traditional email spam, social spam can reach a large audience by nature of the platform and can appear trustworthy since it is coming from people in your …

IBM cloud tool enables privacy-preserving user authentication

Identity Mixer, a new tool to protect a consumer’s personally identifiable information, is now generally available on IBM Cloud. The tool is built on years of cryptography …

Four ways an attacker can infiltrate an organization by diverting security solutions

Employing one of the many security solutions on the market today does not mean your organization is immune to infiltration – that much is clear from the constant string …

Don't miss

Cybersecurity news