Latest News

  • More than a year after security firm Mandiant caused a stir by publishing a report that alleged China was behind widespread and increasingly sophisticated cyber-espionage projects, it’s back again to tell us that things have gone from bad to worse.
  • There is a growing global criminal-infrastructure-as-a-service economy being perpetrated through exploit kits and compromised website redirection chains – with billions of attacks adding to cybercriminals' sophistication and ability to evade detection. According to the latest Websense Security Labs 2014 Threat Report, the infrastructure of an attack campaign is now typically constantly developed, enhanced and reused throughout the entire threat lifecycle.
  • An initiative that cuts across the security vendor landscape is one way that Exclusive Networks helps customers turn their preventive technologies into a problem solver in the aftermath of a data breach incident
  • A prolific international scheme designed to fleece unwary consumers with bogus sub-$15 charges is making the rounds, according to security researcher Brian Krebs. The common thread? The victims have all paid for online learning tools, but instead have been subjected to multiple junk charges from a company called “BLS Weblearn.”
  • It’s been in the works for months, but the UK's Computer Emergency Response Team (CERT-UK) has officially opened its doors for business, promising to “provide an authoritative voice to those agencies and organizations that are helping the UK to become more resilient and to prosper in the internet age.”
view more

Trending Topic - #Heartbleed

Blogs

  • Posted by IRM Plc • 14 April 2014
    By Punam Tiwari On my return home from my Cheltenham Head Office one evening, I happened upon an opinon article quite randomly lying around in the train by David Aaronovitch of The Times, titled...
    rated:
  • Posted by Bob Tarzey • 21 March 2014
    It will not be news to anyone who has written code that the time to kill software bugs is early on in the application development lifecycle, before they can have a major impact. This is important for ...
    rated:
  • Posted by Drew Amorosi • 17 March 2014
    Nine months and counting – nine months since Edward Snowden first told the world that the US government logged the metadata of all telephone traffic. Shortly after came PRISM, involvement by the...
    rated:
  • Posted by Bob Tarzey • 10 March 2014
    Sometimes technology areas that once seem distinct converge. Indeed, there was a time when the term convergence was used, without qualification, to refer to the coming together of IT and traditional t...
    rated:
view more

Features

view more
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×