Supreme Court hears first appeals case for exec convicted under CFAA

The U.S. Supreme Court hears a case that could determine determine requirements of the Computer Fraud and Abuse Act (CFAA).

Black SEO offered to cyber-criminals

Trend Micro's new report has shown that Chinese Cyber-criminals are selling SEO services on Apple's App store.

FBI investigates Russian hacker that stole billions of login credentials

A suspected Russian hacker claiming to have stolen 1.2 billion unique email and password combinations is being pursued by the FBI.

5M affected in VTech breach; security concerns raised with popular holiday items

A breach at Hong Kong-based toymaker VTech has affected nearly five million and prompted some to rank it the fourth biggest breach to date.

Internet of malicious things: Yale home automation vulnerable

The Yale Home System (Europe) Android application vulnerable to a man-in-the-middle attack due to TLS errors .

Featured: Malware

Google removes 440k links under 'Right to be Forgotten' ruling

Google has released a report on all the data it has removed from its search results, after the Court of Justice of the European Union ruled last May that users have the 'right to be forgotten'.

Product Reviews

Rsam GRC Platform

Rsam is undeniably a traditional GRC product but with a few nice twists.

Skybox SecuritySkybox Enterprise Suite

Skybox Enterprise Suite is strongly focused on the risk part of GRC.

SolarWinds Network Configuration Manager

The Network Configuration Manager takes everything that SolarWinds does well and wraps it in a cloak of GRC functionality.

November issue now available


Opinions The Security Vulnerability You Can Prevent

The Security Vulnerability You Can Prevent

The Internet of Things is one of the world's fastest growing technologies. Unfortunately, it is also poised to become the fastest growing source of security vulnerabilities in the enterprise - but it doesn't have to be that way.

Opinions All Talk-Talk and No Action

All Talk-Talk and No Action

The latest cyber attack, a breach compromising the data of up to four million of Talk-Talk's loyal customers, is yet another in a growing line of pernicious cyber attacks against corporate infrastructure.

Opinions How vulnerable is the fingerprint scanner on your phone?

How vulnerable is the fingerprint scanner on your phone?

There are legal issues and technical vulnerabilties aound the use of fingerprint scanners on mobiles, hence, Anthony Neary says, it is vital to have a mix of solutions which enable maximum possible security.

Sign up to our newsletters