Infosecurity Magazine Features

Lizard Squad: Original Pranksters

Lizard Squad: Original Pranksters

Whether meddling kids or a serious menace, Lizard Squad is part of a phenomenon that is here to stay

Google vs Microsoft: Let the Patch Wars Commence

Google vs Microsoft: Let the Patch Wars Commence

Phil Muncaster investigates whether an ongoing dispute between Google and Microsoft could change the way we fix security flaws in the future

Nice and Easy Does it: ‘Back to Basics’ Hacking Methodologies

Nice and Easy Does it: ‘Back to Basics’ Hacking Methodologies

We’re all looking for the next great threat to infrastructure, but there is still a host of simple attacks we should be guarding against, says Rene Millman

The Cyber-Threat of Things

The Cyber-Threat of Things

There is an increasing landscape of risks facing well-connected businesses, and security practitioners must act now to mitigate them, explains Wendy M. Grossman

Computer Says “No”: Will We Ever be Rid of DDoS Attacks?

Computer Says “No”: Will We Ever be Rid of DDoS Attacks?

With DDoS attacks reportedly increasing in size and complexity in 2014, Phil Muncaster canvasses the industry on where the problems lie and how we can respond

A Higher Law

A Higher Law

It is not wisdom, but authority, that makes a law, the saying goes. Perhaps that’s why international cybersecurity laws are so lacking, says Danny Bradbury

Cryptowars 2.0 and the Path to Ubiquitous Encryption

Cryptowars 2.0 and the Path to Ubiquitous Encryption

As government and technology companies square up once again over encryption, Tom Fox-Brewster reports from the frontline of the Cryptowars’ second coming

When Good Hacks Go Bad

When Good Hacks Go Bad

The past year brought greater mainstream press interest in cybersecurity matters than ever before. But despite the wider profile of security issues, the important messages still aren’t getting across, Mike Hine discovers

Phish Your Own Staff: Arming Employees to Beat Modern Attacks

Phish Your Own Staff: Arming Employees to Beat Modern Attacks

Social engineering has long been the preferred route for hackers, whether through the front door or using social media and email. So what better way to protect against the threat than with a bit of ‘social pen-testing’? Davey Winder reports

Outsourcing: When to DIY and When to Call a Consultancy

Outsourcing: When to DIY and When to Call a Consultancy

To outsource or not to outsource: that is the question that has been facing CISOs the world over since the dawn of time, and the question that Phil Muncaster puts to information security experts

Playing for Keeps: How Cyber-Criminals are Following the Money to Video Games

Playing for Keeps: How Cyber-Criminals are Following the Money to Video Games

The global video game market just topped $100bn in value, and cyber-criminals want a piece of it. Danny Bradbury finds out how they operate

Cyber-Warfare: Who’s Afraid of the Big Red Button?

Cyber-Warfare: Who’s Afraid of the Big Red Button?

If current online skirmishes can’t be branded ‘war’, how soon before a major global conflict unfolds, asks Tom Brewster.

What’s Hot on Infosecurity Magazine?