Latest News

  • Netflix is being used in a new phishing scam that lures victims into calling a “tech support” line, connecting to a live human that proceeds to probe around the user’s PC and lift information, behind an elaborate cover.
  • Frequent IT system changes without documentation or audit processes can cause system downtime and security breaches from internal and external threats, while decreasing overall operational efficiency. Yet, a new survey has revealed that a majority of IT professionals have made undocumented changes to their IT systems that no one else knows about.
  • The FBI is planning a new way to track and uncover potential threats – a massive facial recognition database. According to documents obtained by the Electronic Frontier Foundation, the Bureau's database will contain about 52 million biometric records by the end of the year, with plans to hold records on as many as 100 million people, or, roughly one-third of the country’s population. And that, of course, raises privacy concerns.
  • Heartbleed, Zeus, insider threats and more: the financial services sector is under constant attack as cybercriminals look to lift user data and siphon off funds from accounts. The good news is that almost two-fifths (38%) of financial services firms in a recent survey plan to boost spending to combat cyber-crime over the next 12 months.
  • Qualys, Inc., a pioneer and leading provider of cloud-based security and compliance solutions with over 6,000 customers worldwide, will be exhibiting at Infosecurity Europe 2014, which takes place in Earl’s Court, London, from April 29 through May 1.
view more

Trending Topic - #Heartbleed

Blogs

  • Posted by IRM Plc • 14 April 2014
    By Punam Tiwari On my return home from my Cheltenham Head Office one evening, I happened upon an opinon article quite randomly lying around in the train by David Aaronovitch of The Times, titled...
    rated:
  • Posted by Bob Tarzey • 21 March 2014
    It will not be news to anyone who has written code that the time to kill software bugs is early on in the application development lifecycle, before they can have a major impact. This is important for ...
    rated:
  • Posted by Drew Amorosi • 17 March 2014
    Nine months and counting – nine months since Edward Snowden first told the world that the US government logged the metadata of all telephone traffic. Shortly after came PRISM, involvement by the...
    rated:
  • Posted by Bob Tarzey • 10 March 2014
    Sometimes technology areas that once seem distinct converge. Indeed, there was a time when the term convergence was used, without qualification, to refer to the coming together of IT and traditional t...
    rated:
view more

Features

view more
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×