Security
News, Features, and Interviews
News
-
Cryptominers and fileless PowerShell techniques make for a dangerous combo
This new dual-payload cryptojacking malware can disable Windows Antimalware Scan Interface and inject itself directly into memory of legitimate processes.
-
The race for quantum-proof cryptography
Lawmakers briefed on quantum computing’s threat to encryption and the urgent need for mathematical research.
-
‘We have to continuously reinvent ourselves’: Oracle ANZ chief Valery Lanovenko
Explains the drivers behind the company’s new mission statement
-
A new era of cyber warfare: Russia’s Sandworm shows “we are all Ukraine” on the internet
In-depth research on Russia's Sandworm hacking group shows broad capabilities and scope to disrupt anything in any part of the world.
-
Emergent Android banking Trojan shows app overlay attacks are still effective
By taking code from another Android Trojan, Anubis, the Ginp malware has enhanced itself and has begun targeting banks.
-
How a bank got hacked
Phineas Phisher claims to have netted hundreds of thousands of pounds sterling in a 2016 hack of the Cayman National Isle of Man Bank.
-
Interpol plans to condemn encryption spread, citing predators, sources say
Service providers, application developers and device manufacturers are developing and deploying products and services with encryption which effectively conceals sexual exploitation of children occurring on their platforms
-
How much does it cost to launch a cyber attack?
Just like in regular business, cyber criminals have a cost of operation and a return on investment to worry about.
-
How EDR stops hackers in their tracks
EDR is a category of security tools that monitor end-user hardware devices across a network for a range of suspicious activities and behaviour.
-
California reveals Facebook probe, says social media company stonewalling investigation
The Facebook state investigations are part of a larger landscape of probes of big tech firms by the U.S. Justice Department and the Federal Trade Commission, as well as the House of Representatives Judiciary Committee.
Features
Twitter spy scandal a wake-up call for companies to clean up their data access acts
Facebook's Libra crypto backers step back amid regulatory pressure
Why local governments are a hot target for cyberattacks
This is how blockchain might solve the internet privacy problem
4 must-know facts about secure mobile printing
Is your data being sold on the dark web?
Shadow cloud apps pose unseen risks
In Equifax data breach, three hard lessons in risk
Credit card fraud: What you need to know now
IoT security for healthcare is in critical condition
Case Studies
How to improve your disaster recovery preparedness
Confessions of a professional bank robber
The top 10 security essentials for the networked enterprise
Digital dangers
How to prevent IT sabotage inside your company
New skills needed for cloud computing
Helping employees really 'get' company security policy
Dipping into the till
How to protect your company during a relocation
Embracing ‘rogue’ technology