Feedback

Security Professional

Straight Talk: What is the cloud?

17 Oct 2014  by Bill Andrews
Straight Talk: What is the cloud?
This is the second part of a new series that dives into the question regarding whether cloud computing can be used for data backup and, if so, where?

McAfee unveils upgraded next-generation firewall

17 Oct 2014  by Sam Pudwell
McAfee unveils upgraded next-generation firewall
This year marks the 25th anniversary of the firewall and McAfee has acknowledged this milestone by upgrading its next-generation firewall, adding new levels of integration and connectivity.

Microsoft releases 8 patches, including anti-Sandworm fix - get yourself covered!

17 Oct 2014  by Dan Raywood
Microsoft releases 8 patches, including anti-Sandworm fix - get yourself covered!
Microsoft released three critical patches last night, including a fix for the flaw being exploited by the sandworm gang.

Why protecting your PC is like defending a Medieval castle

17 Oct 2014  by Ian Barker
Why protecting your PC is like defending a Medieval castle
Most people are aware that they need to have some form of protection on their PC if it's attached to the internet. Yet it seems that a lot of users still don't know how to properly protect themselves.

Intel’s new security service makes electronic payments safer

16 Oct 2014  by Barclay Ballard
Intel’s new security service makes electronic payments safer
The chip maker claims to have developed a new hardware-software bundle that uses multiple security layers, offering greater protection to retail transactions.

Why cloud-based security is here to stay

16 Oct 2014  by Ian Barker
Why cloud-based security is here to stay
As the popularity of cloud services has grown, so have concerns over the security of the data that's stored on them. This has led security vendors to adapt and develop new solutions.

Russian hackers spy on Nato and the West using Sandworm

15 Oct 2014  by Jamie Hinks
Russian hackers spy on Nato and the West using Sandworm
A bug in Microsoft Windows has been used by Russian-based hackers to infiltrate a number of states in the West to try and pilfer information linked to the conflict in Ukraine.

80% of South Koreans need new IDs following huge data theft

15 Oct 2014  by Jamie Hinks
80% of South Koreans need new IDs following huge data theft
The government will be forced to spend billions of dollars to issue new ID numbers to at least 80 per cent of all citizens over 17 after a theft that dates back a decade.

Apple requests covert challenge to GT bankruptcy with trade secrets at risk

15 Oct 2014  by Barclay Ballard
Apple requests covert challenge to GT bankruptcy with trade secrets at risk
The Cupertino-based firm has filed a motion to make its objections under court seal, in order to protect confidentiality agreements agreed between itself and GT Advanced Technologies.

How Adobe overhauled their whole security team - and how you can too

15 Oct 2014  by Paul Cooper
How Adobe overhauled their whole security team - and how you can too
Since the devastating breach that hit Adobe last year, they've been overhauling their whole system. Here's how they went about it, and how you can do the same with your business.

Security warning: Vicious POODLE attack bytes Google SSL 3.0

15 Oct 2014  by Mark Wilson
Security warning: Vicious POODLE attack bytes Google SSL 3.0
Google's security team has discovered a vulnerability in SSL 3.0 called POODLE which can be exploited to steal secure cookies and other data.