Feedback

Security Professional

Hackers using Gmail drafts to steal data and update malware

17 hours ago  by Tom Phelan
Hackers using Gmail drafts to steal data and update malware
The Gmail drafts folder provides hackers with a sneaky way of sharing malware, enabling them to hack deep into computers and steal user data.

Why are two clouds better than one?

17 hours ago  by Orlando Scott-Cowley
Why are two clouds better than one?
When it comes to protecting your business critical applications, one cloud is a good start but two are much better. No, really.

How to choose the right file sharing service for your business

18 hours ago  by Orlando Scott-Cowley
How to choose the right file sharing service for your business
From Dropbox, to Google, to Mimecast, there's a long list of file sharing services vying for your business's attention. Here's a guide to choosing one.

If next generation firewalls don't evolve, they'll soon be irrelevant

22 hours ago  by Sean Newman
If next generation firewalls don't evolve, they'll soon be irrelevant
While NGFWs continue to be a vital part of an organisation's protection, they were designed for a time before advanced targeted threats started attacking our enterprises, which often go undetected.

Google to encrypt user data as default on Android 5.0 Lollipop

29 Oct 2014  by Barclay Ballard
Google to encrypt user data as default on Android 5.0 Lollipop
The search engine giant has included the feature in the latest version of its Android OS, which will prevent Google from unlocking a device, even if requested to do so by police officials.

FireEye uncovers Russian malware with hint of government backing

29 Oct 2014  by Jamie Hinks
FireEye uncovers Russian malware with hint of government backing
The malware has been reportedly been written by Russian language operators and developers that have used it to gather intelligence on governments and militaries in Eastern Europe.

White House down: Computer systems hacked by unconfirmed assailant

29 Oct 2014  by Paul Cooper
White House down: Computer systems hacked by unconfirmed assailant
Hackers have breached computer systems at the White House. The measures put in place to identify the attackers and prevent further compromise have shut down the White House computer network.

Renée James: IoT could be a goldmine for hackers but Intel Security and McAfee are up for a fight

28 Oct 2014  by Aatif Sulleyman
Renée James: IoT could be a goldmine for hackers but Intel Security and McAfee are up for a fight
While a lot of security experts are content with throwing around soundbites like "we need to think outside the box" and "we need to be ahead of the game" willy-nilly, James seems different.

Car thieves hack into keyless cars in spate of London robberies

28 Oct 2014  by Jamie Hinks
Car thieves hack into keyless cars in spate of London robberies
Keyless car crime is on the rise in London with criminals able to hack into onboard computers and start cars, and the Range Rover Evoque is one of a clutch of models to be targeted.

‘Al-Quida’ Wi-Fi hotspot grounds LAX to London flight for 14 hours

28 Oct 2014  by Jamie Hinks
‘Al-Quida’ Wi-Fi hotspot grounds LAX to London flight for 14 hours
One passenger’s Wi-Fi hotspot name of “Al-Quida Free Terror Nettwork” caused the London-bound flight to be hit with a heavy delay as police investigated.

Ever used Tor? Then your computer might be riddled with malware

28 Oct 2014  by Paul Cooper
Ever used Tor? Then your computer might be riddled with malware
Authorities are advising all users of the Tor network to check their computers for malware after it emerged that a Russian hacker has been using the network to spread a powerful virus.