Think your anti-virus program is causing a conflict with some other program? Here's how to switch it off for temporary troubleshooting
Researchers found critical vulnerabilities in satellite communications devices used in the defense, maritime, aerospace and other sectors
18 April 2014, 17:20. Topics: Security
Another 400,000 cards at subsidiary Aaron Brothers may have been affected
18 April 2014, 03:05. Topics: Security
Managing the danger of cyberattacks has to involve all parts of an enterprise, speakers tell a Kaspersky conference
17 April 2014, 22:48. Topics: Security
The new browser plug-in can identify Web sites that maybe vulnerable to the OpenSSL bug
17 April 2014, 20:33. Topics: Security
The Tor Project banned 380 vulnerable entry and exit relays and is eyeing 1,000 more
17 April 2014, 17:16. Topics: Security
- Facebook users targeted by iBanking Android trojan app
- Windows XP's retirement turns into major security project for Chinese firm
- Teen arrested in Heartbleed attack against Canadian tax site
- Court rejects Lavabit appeal, cites improper procedural handling
- Lavaboom builds encrypted webmail service to resist snooping
Apple has improved its security in recent years, but is it enough?
10 March 2014, 11:05. Topics: Applications
Most malware is mundane, but these innovative techniques are exploiting systems and networks of even the savviest users
30 December 2013, 22:32. Topics: Security
Inbound email sandboxin, real-time analysis of web traffic and much, much more
Back-up, update, have tough passwords, harden your server - there is much you can do
This technique is not well known, but it's relatively simple
Malnets are extensive distributed network infrastructures embedded in the Internet, but there is something you can do
Need to share some private data but don't want to risk a hack attack? Read on
The paper reviews the process of ICT disposal and relates it to current UK data protection requirements. It then introduces some of the changes happening to this legislation and concludes with recommendations for UK businesses to follow in order to not only comply with current UK Data Protection law, but also hypostatises on steps to take to future proof against future changes to the law and technology.
Advanced Persistent Threats (APT) are a serious concern in today’s threat landscape. They represent a threat to an organiasation’s intellectual property, financial assets and reputation. In some cases, these threats target critical infrastructure and government suppliers, thereby threatening the victim country’s national mission.
This analysis explains common APT lifecycle phases and provides an understanding of why APT defensive strategies require careful thought that goes beyond the implementation of common security hardware and software solutions.