SafeBreach Simulates Attacks on Customers to Find Security Risks
Attackers use multiples types of tools and techniques to exploit an organization that SafeBreach automates in an effort to determine risk. One way to know if a company is vulnerable to attacks is to...
View ArticleWhy Your Enterprise Must Pay Close Attention to IoT Device Security
NEWS ANALYSIS: It's apparent now that Internet of Things security is laughably bad, but you can prevent your enterprise from being the butt of the joke. The woman on the videoconference screen looked...
View ArticleInternet of Things Security Problem Just Keeps Gettin Bigger
Recent reports about Webcams being readily accessible to anyone using an Internet port-scanning service shows why there has been little progress in securing connected devices as we move into 2016 Every...
View ArticleScriptRock Rebrands as UpGuard With More Focus on Security
The visibility vendor doubles down on security with a new scoring system to help organizations and insurance companies evaluate and remediate risk. When it comes to understanding the security risks an...
View ArticleGoogle’s Chrome Browser May Soon Mark HTTP Sites Unsafe
Google reportedly plans to introduce a feature in its Chrome browser that warns users when they land on a HTTP site. Google is reportedly getting ready to implement a proposal it made slightly more...
View ArticleDDoS Targets, Motivations Evolve as Attack Volumes Hit New Peaks
Criminals and rogue gamers have become the main sources of distributed denial-of-service attacks, as the peak attack size reaches 500G bps. Distributed denial-of-service attacks used to be reserved as...
View ArticleNSA Gives Advice on Defending Against Nation-State Attackers
The head of NSA's offensive operations division explained how it uses vulnerabilities and how organizations can defend themselves. Among the cache of documents leaked by U.S. National Security Agency...
View ArticleSpotting Insecure Websites Requires More Than Google’s Red X
NEWS ANALYSIS: Google’s plan to flag Websites as insecure depending on if it supports the HTTPS protocol is well intentioned. But it misses the mark in terms of flagging what’s secure and what’s not....
View ArticleAzzurri maintains government-level security credentials with renewal of Cyber...
London, 2nd February 2016: Managed communications services provider Azzurri Communications today announced that it has achieved the Government’s Cyber Essentials Plus accreditation for a second year....
View ArticleAppSense Announces Record Results for Q2 and First Half of Fiscal 2016
Company Marks Best Quarter in History as Demand for Endpoint Security Solutions SoarsREADING, UK., February 2, 2016 – AppSense, the global leader of secure user environment management (UEM), today...
View ArticleFisher-Price Smart Teddy Bear Latest IoT Toy Under Hacker Scrutiny
The latest device with a security vulnerability is Fisher-Price's Smart Toy, as flaws in the connected Internet of things world continue to mount. When it comes to the emerging Internet of things...
View ArticleU.S., EU Agree on Privacy Shield to Maintain Transatlantic Data Flow
Salesforce.com is introducing new and updated products based on its Lightning interface technology that are designed to enable businesses to run their sales operations on mobile devices. The free flow...
View ArticleRigby Private Equity Opens Up New Office In Austria
Wick Hill and Zycko strengthen Austrian business with new office in ViennaLondon, Cirencester and Woking, UK: Rigby Private Equity (RPE) announces the opening of a new office in Vienna, Austria....
View ArticleLogicalis and HPE Introduce ‘IT Custodian’: Best Practice Service Management...
Logicalis SMC and HPE combine to accelerate digital transformation via a complete, rapidly deployable big data ITSM solutionLondon, UK, 03 February 2016 – Logicalis, the international IT solutions and...
View ArticleGoogle to deep six dodgy download buttons
Google has taken aim at another class of internet scumware: the deceptive download buttons that infest advertising on places like free software directories. “Your computer is out of date!” ads and the...
View ArticleMicrosoft’s malware mitigator refreshed, but even Redmond says it’s no longer...
Microsoft's enhanced mitigation toolkit (EMET) has been updated with support for Windows 10, but the company says you don't really need to download it any more. The defence tool is Microsoft's way of...
View ArticleGo phish your own staff: Dev builds open-source fool-testing tool
Security-oriented programmer Jordan Wright has published a capable and slick open source framework to help businesses defend against phishing attacks. The anti-phishing tool runs on 64-and-32-bit...
View ArticleWinning Underhand C Contest code silently tricks nuke inspectors
The winner of an annual competition to write the best innocent-looking but actually malicious C code has been announced – and it terrifyingly involves hoodwinking nuclear weapons inspectors. On...
View ArticleRow over GCHQ-built voice algo MIKEY SAKKE rumbles on
GCHQ has defended its controversial MIKEY-SAKKE phone encryption protocol against criticism that it leaves a backdoor into systems that support the technology. The CESG assurance arm of the UK...
View ArticleISPCC Childline and Vodafone Ireland Foundation Announce Major New Partnership
Working to Keep Children Safe by Keeping Them Connected4th February 2016 ISPCC Childline and the Vodafone Ireland Foundation are delighted to announce a major five year partnership that aims to keep...
View Article