In the latest instalment of the 'Tales of the Cyber Underground' series, Tom Brewster looks into a piece of Android malware selling for thousands on the forums, but appears to have succumbed to an early demise...
04 March 2014
How do White Hats and Black Hats learn their trade? And are pen testing tools like Metasploit more useful for attackers or defenders? Drew Amorosi attends a master hacking class to find out…
25 February 2014
Charities face all the same information security challenges as the public and private sectors, with a couple of extra to boot. Wendy M. Grossman speaks to third-sector CISOs to find out exactly how they are being targeted by shameless cybercriminals
13 February 2014
In the latest installment of the 'Tales of the Cyber Underground' series, Tom Brewster uncovers a spat between an ex-blackhat and a crook using Java exploits to infect machines...
03 February 2014
As smaller businesses look to put in place bring your own device (BYOD) responses and boost network security, Jesse Lipson of Citrix looks at the importance of understanding and documenting relevant controls. This is not a one-off task, as the needs of the business, its staff and supporting technologies continuously evolve
23 January 2014
Real-world experiences and internal knowledge transfer increase the proficiency of IT security teams, says Hamlin Tallent of Sentek Global
15 January 2014
CyberArk’s Udi Mokady provides top tips on risk mitigation against internal and external threats for organizations
14 January 2014
Creating a cybersecurity policy is hard, largely because it’s so difficult to define success. A national cybersecurity initiative should define the goals we want to achieve and provide incentives for the private and public sector to cooperate. According to Matthew Cohen of NT OBJECTives, once that is done, the private sector can do what it does best: compete to provide the most robust and cost-effective solutions to the problem
09 January 2014
An increasing amount of lip service is being paid to ‘hack back’ initiatives. While rules and levels of acceptance vary according to hack back entity – military, law enforcement and private industry – Kevin Townsend finds that perhaps the largest variance of opinion comes down to geography as he asks the question: Should hack back be a legal right for those under cyber-attack?
06 January 2014
Increasingly complex threats lead Raj Samani to conclude that the state of data security is worse off than it was a decade ago – but not all is lost, as he explains
23 December 2013