Lenovo patches username/password vulnerabilities

Lenovo patched two vulnerabilities over the Thanksgiving holiday that would allow a hacker to acquire administrative privileges.

Nine percent of HTTPS hosts on the web "share the same private keys"

Stefan Viehböck, senior security consultant at SEC Consult, examined 4000 devices from 70 vendors and found widespread reuse of private keys.

'Tis the season for holiday shopping scams

With Black Friday here and shoppers using every online method available to find the best deals, Cisco Talos Security Intelligence and Research Group warned shoppers that cybercriminals will also be out in force this holiday season.

Americans worry about online crime, but leave themselves open to attack

A new Norton by Symantec study found 80 percent of Americans are worried they will be victimized by an online crime, but at the same time consumers are over confident in the belief that their online habits are safe.

Anonymous' Twitter war hits stumbling block

Anonymous' crowd-sourced Twitter war against the so-called Islamic State has been hit with accusations of unreliability.

Featured: Malware

Google removes 440k links under 'Right to be Forgotten' ruling

Google has released a report on all the data it has removed from its search results, after the Court of Justice of the European Union ruled last May that users have the 'right to be forgotten'.

Product Reviews

Rsam GRC Platform

Rsam is undeniably a traditional GRC product but with a few nice twists.

Skybox SecuritySkybox Enterprise Suite

Skybox Enterprise Suite is strongly focused on the risk part of GRC.

SolarWinds Network Configuration Manager

The Network Configuration Manager takes everything that SolarWinds does well and wraps it in a cloak of GRC functionality.

November issue now available


Opinions The Security Vulnerability You Can Prevent

The Security Vulnerability You Can Prevent

The Internet of Things is one of the world's fastest growing technologies. Unfortunately, it is also poised to become the fastest growing source of security vulnerabilities in the enterprise - but it doesn't have to be that way.

Opinions All Talk-Talk and No Action

All Talk-Talk and No Action

The latest cyber attack, a breach compromising the data of up to four million of Talk-Talk's loyal customers, is yet another in a growing line of pernicious cyber attacks against corporate infrastructure.

Opinions How vulnerable is the fingerprint scanner on your phone?

How vulnerable is the fingerprint scanner on your phone?

There are legal issues and technical vulnerabilties aound the use of fingerprint scanners on mobiles, hence, Anthony Neary says, it is vital to have a mix of solutions which enable maximum possible security.

Sign up to our newsletters