Sky’s Android users may have woken on Sunday morning to headlines screaming ‘Sky UK Apps Compromised on Play Store, Uninstall Them!’ But don’t be too hasty.
Man made redundant fined for stealing sensitive information
When he learned that he was being made redundant from his position as Community Health Promotions Manager at a council-run leisure center, he emailed sensitive medical information on 2471 people to himself to help establish his own new company.
Experian tackles social media risk
Global financial information company and credit score keeper Experian has implemented new security controls to drive cyber-risk out of its social media activities, in an effort to safeguard consumer information.
Microsoft Stops Predicting AV Samples to Focus on Ecosystem
The Microsoft Malware Protection center is shifting its research focus away from predicting test samples and instead focussing on prevalence-weighted response and family research.
DDoS and the challenge of civil disobedience on the internet
Starting with the Anonymous Operation Payback in 2010, in retaliation for what many consider the illegal financial blockade of WikiLeaks, DDoS as a weapon of dissent has increasingly become a part of life on the internet.
Education Institutions at Forefront of BYOD
BYOD as a security issue has largely focused on the business arena – the dangers inherent in allowing personal smartphones and tablets to connect to the corporate network. But mobile devices have been adopted as a way of life with youngsters, and in so…
Blue Coat Systems to acquire Solera Networks
Blue Coat operates largely outside of the perimeter; Solera Networks operates within the perimeter. Put the two together and you have the complete security solution – that is the the theory behind Blue Coat’s latest acquisition.
Most small businesses don’t understand mobile security threats
New research into eight critical security threats on mobile devices found the majority of small to medium enterprises (SMEs) are either unaware of or defenseless against the threats posed to their networks by mobile devices and BYOD.
The HangOver Campaign – more on Indian hackers targeting Pakistan
A few days ago details of a long-standing and wide-ranging attack primarily against Pakistan and apparently emanating from India were released. Now it appears it was just the tip of an iceberg.
Queen’s Speech and user identification through IP addresses
The reason for Her Majesty’s government to bring forward proposals viz-a-viz “the problem of matching Internet Protocol addresses” (Queen’s Speech 2013) may have as much to do with BT’s current plans as with the stalled Communications Data Bill.