Features

Malware and Hardware Security

Tales of the Cyber Underground: LessPay, Cybercriminals’ Hot New Virtual Currency? Tales of the Cyber Underground: LessPay, Cybercriminals’ Hot New Virtual Currency?

Law enforcement agencies across the world are obsessed with virtual currencies, be it Bitcoin, Litecoin or Dogecoin. This was made apparent on a recent trip to Europol’s European Cyber Crime Centre (EC3) in The Hague.
08 April 2014

Windows XP’s Time Has Come…and Gone Windows XP’s Time Has Come…and Gone

With support for Windows XP set to run out as of tomorrow, April 8, Microsoft’s Tim Rains issues a last-minute warning on why users of the venerable operating system should upgrade now
07 April 2014

The Generation X, Y, Z of Information Security The Generation X, Y, Z of Information Security

Not all millennials approach privacy and security with the same attitudes. As Tom Brewster discovers, regardless of age, a one-sized-fits all approach to information security is not the solution
02 April 2014

Members' Content

Anti-Virus: Little More Than a Team Player Anti-Virus: Little More Than a Team Player

Anti-virus is just one small part of the holistic security strategy, argues Ryan W Smith
28 March 2014

Anti-virus Lives to Fight Another Day Anti-virus Lives to Fight Another Day

Anti-virus remains a cornerstone of any security strategy, finds David Harley, as he acknowledges the contributions of anti-malware researchers
28 March 2014

Comment: APT Detection – Closing the Gaping Hole Comment: APT Detection – Closing the Gaping Hole

Technology solutions to combat advanced persistent threats are in no short supply, but actually detecting these targeted infiltrations remains difficult. Avishai Ziv of LynuxWorks examines the reasons, and how to overcome the problem
24 March 2014

Financial Markets: A Playground for Cybercriminals Financial Markets: A Playground for Cybercriminals

The financial markets are supposed to be transparent, and efficient. But what happens if cybercriminals begin playing with them, and would we even know it was happening? Danny Bradbury investigates
21 March 2014

Members' Content

A No Bullshit Look at the Infosec Industry: An Interview with BeyondTrust’s CTO A No Bullshit Look at the Infosec Industry: An Interview with BeyondTrust’s CTO

Sat in the BeyondTrust glass cube meeting room on the RSA Conference show floor in San Francisco, Marc Maiffret, CTO of BeyondTrust, shares his thoughts on the information security market with me in the only way he knows how – sans “bullshit”.
13 March 2014

Comment: Protecting Customer Data from Online Vulnerabilities Comment: Protecting Customer Data from Online Vulnerabilities

Following the Barclays data breach, where thousands of confidential customer files were stolen and sold, Wieland Alge of Barracuda Networks shares his views on the current threats to business data and the areas that must be addressed to keep ahead of new exploitation tactics
13 March 2014

Interview: Brian Honan Interview: Brian Honan

Brian Honan is a man who wears many hats, but all of them are white. Eleanor Dallaway travels to Dublin to spend an afternoon with one of the information security industry’s favorite treasures
11 March 2014

Showing 1 - 10 of 247 articles
We use cookies to operate this website and to improve its usability. Full details of what cookies are, why we use them and how you can manage them can be found by reading our Privacy & Cookies page. Please note that by using this site you are consenting to the use of cookies. ×