Latest News

  • Apple has fixed a critical “triple-handshake” crypto vulnerability with a round of OS X and iOS updates that would allow an attacker with a privileged network position to capture data or change the operations performed in sessions protected by SSL.
  • Mobile banking trojans! Bitcoin wallet attacks! Cyber-espionage threats! It turns out that these three cyber-baddies are developing their attack trajectories exactly as predicted for 2014.
  • Purveyors of distributed denial of service (DDoS) attacks are chewing up more bandwidth than ever before, and, according to Akamai Technologies’ Prolexic Q1 2014 Global DDoS Attack Report, are looking to turn the internet into one on-demand botnet thanks to evolving techniques that can deliver a bigger punch with fewer resources.
  • Samsung and PayPal have announced that they will be using the S3 Authentication Suite from Nok Nok Labs to leverage the emerging Fast IDentity Online (FIDO) standards for mobile payments.
  • In the latest Verizon Data Breach Investigations report (DBIR), Verizon researchers noted that 92% of the 100,000 security incidents analyzed over the past 10 years can be traced to nine basic attack patterns that vary from industry to industry.
view more

Trending Topic - #Heartbleed


  • Posted by Ernst & Young LLP • 16 April 2014
    By Mark Brown Much has been made of Microsoft’s decision to stop security support for Windows XP over the last few weeks. Some commentators have likened it to something of a Y2K-esque tech apo...
  • Posted by IRM Plc • 14 April 2014
    By Punam Tiwari On my return home from my Cheltenham Head Office one evening, I happened upon an opinon article quite randomly lying around in the train by David Aaronovitch of The Times, titled...
  • Posted by Bob Tarzey • 21 March 2014
    It will not be news to anyone who has written code that the time to kill software bugs is early on in the application development lifecycle, before they can have a major impact. This is important for ...
  • Posted by Drew Amorosi • 17 March 2014
    Nine months and counting – nine months since Edward Snowden first told the world that the US government logged the metadata of all telephone traffic. Shortly after came PRISM, involvement by the...
view more


view more
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×