Supreme Court hears first appeals case for exec convicted under CFAA

The U.S. Supreme Court hears a case that could determine determine requirements of the Computer Fraud and Abuse Act (CFAA).

5M affected in VTech breach; security concerns raised with popular holiday items

A breach at Hong Kong-based toymaker VTech has affected nearly five million and prompted some to rank it the fourth biggest breach to date.

Internet of malicious things: Yale home automation vulnerable

The Yale Home System (Europe) Android application vulnerable to a man-in-the-middle attack due to TLS errors .

Threat Hunter Blog - Welcome

This blog has bounced around for quite some time now. It is my sincere hope that it has found a permanent home here. Time, I guess, will tell. For those who have not read earlier versions of this a bit of explanation is in order. For those who have, there are a few changes that I hope you'll appreciate.

Telegram metadata allows for 'stalking anyone'

Researchers discovered more problems with Telegram, the messaging app founded by the Russian tech entrepreneur brothers Nikolai and Pavel Durov.

Featured: Malware

WordPress sites once again being compromised

The Reader's Digest and other WordPress-based websites are once again on the receiving end of a hacking campaign with this one injecting the sites with malware that has uses Angler exploit kit upload various trojans.

Product Reviews

Rsam GRC Platform

Rsam is undeniably a traditional GRC product but with a few nice twists.

Skybox SecuritySkybox Enterprise Suite

Skybox Enterprise Suite is strongly focused on the risk part of GRC.

SolarWinds Network Configuration Manager

The Network Configuration Manager takes everything that SolarWinds does well and wraps it in a cloak of GRC functionality.

November issue now available


Opinions The Security Vulnerability You Can Prevent

The Security Vulnerability You Can Prevent

The Internet of Things is one of the world's fastest growing technologies. Unfortunately, it is also poised to become the fastest growing source of security vulnerabilities in the enterprise - but it doesn't have to be that way.

Opinions All Talk-Talk and No Action

All Talk-Talk and No Action

The latest cyber attack, a breach compromising the data of up to four million of Talk-Talk's loyal customers, is yet another in a growing line of pernicious cyber attacks against corporate infrastructure.

Opinions How vulnerable is the fingerprint scanner on your phone?

How vulnerable is the fingerprint scanner on your phone?

There are legal issues and technical vulnerabilties aound the use of fingerprint scanners on mobiles, hence, Anthony Neary says, it is vital to have a mix of solutions which enable maximum possible security.

Sign up to our newsletters