Attackers turn to IE: Report

Know your enemy is a good defence for any country, or enterprise. So here's more advice for CSOs from another security vendor about what they're likely to face in the short term. Microsoft

Published on: July 27th, 2014 Howard Solomon

Google to go after all bugs

Zero-day exploits are the bane of IT security professionals. Google says it will fight them with Project Zero. The search company said last week that it has created a new "well-staffed" team to

Published on: July 22nd, 2014 Howard Solomon

How the Nasdaq was hacked

There have been lots of reports that governments around the world aren't paying enough attention to protecting their critical infrastructure -- telecom networks, water systems and power grids -- from cyber attacks. Stock markets would

Published on: July 18th, 2014 Howard Solomon

Hackers returning to Visual Basic downloaders: Sophos

Hackers are returning to a decade-old method for inserting malware into people’s machines, according to a recent report from security solutions company Sophos Ltd. In the period between March and May of 2014, Sophos

Published on: July 9th, 2014 Candice So

Worry over ransomware picking up, study suggests

It may be a dead heat, but among all the IT professionals in the data centre, arguably no one is under more pressure these days than the chief security officer because of the

Published on: July 2nd, 2014 Howard Solomon

New ransomware down, rootkits up, says McAfee report

For several years the number of new Windows rootkits has been dropping for a variety of reasons, including the added protection in 64-bit processors and operating systems. But a new report from McAfee

Published on: June 24th, 2014 Howard Solomon

Justice staff fall for phishing ploy

When the CEO asks IT how secure the organization is the answer ranges from 'As good as the budget you give me' to 'Excellent, because we follow best practices.' The truth is many organizations

Published on: June 23rd, 2014 Howard Solomon

Don’t yank Java so fast, says expert

A lot of IT security professionals are trying to lower their consumption of java, and not necessarily coffee. In the face of ever-increasing Java exploits -- some 60 were discovered last year alone --

Published on: June 20th, 2014 Howard Solomon

Post-breach etiquette: nine rules when the worst happens

Sure, into every life a little rain must fall. But are data breaches as inevitable? These days, the answer seems to be Yes. High-profile hacks like Target, the Heartbleed breaches, eBay... the theft

Published on: June 13th, 2014 Andrew Brooks