Latest Articles

Digital Security

5 key aspects for safe virtualization

5 key aspects for safe virtualization

Digital Security

5 key aspects for safe virtualization

Camilo Gutierrez Amaya looks at five key aspects for aspects that companies should be taken into consideration when developing a virtualization project.

Camilo Gutiérrez Amaya19 Nov 2015


Secure Coding

Birds of a feather code together

Birds of a feather code together

Secure Coding

Birds of a feather code together

Lysa Myers, a security researcher at ESET, looks at the diversity challenges and opportunities in information security - while there is much to be done, there's a lot to be optimistic about she says.

Lysa Myers18 Nov 2015


Instagram’s new API policy toughens access to its feed

Instagram’s new API policy toughens access to its feed

Instagram’s new API policy toughens access to its feed

Instagram's new API policy makes it a lot harder for third party apps to gain access to its feed. News of this comes on the back of a malicious app harvesting its user’s details.

Narinder Purba18 Nov 2015


Malware, Cybercrime

Fighting talk from Great Britain as it says it will hit back against internet attacks

Fighting talk from Great Britain as it says it will hit back against internet attacks

Malware, Cybercrime

Fighting talk from Great Britain as it says it will hit back against internet attacks

British chancellor George Osborne has warned about the spectre of online terrorists attacking national infrastructure, and made some rather bold pronouncements about the UK's willingness to engage in cyberwarfare to defend itself.

Graham Cluley18 Nov 2015


Digital Security

UK commits to new National Cyber Centre in 2016

UK commits to new National Cyber Centre in 2016

Digital Security

UK commits to new National Cyber Centre in 2016

The UK’s chancellor, George Osborne, has revealed that a new National Cyber Centre will be developed in 2016, helping the UK deliver a robust and centralized response to this growing threat.

Narinder Purba17 Nov 2015


Apple’s Tim Cook: There’ll be no backdoor in encryption

Apple’s Tim Cook: There’ll be no backdoor in encryption

Apple’s Tim Cook: There’ll be no backdoor in encryption

Apple’s Tim Cook has said in an interview with the Irish Independent that the idea of introducing backdoor access into encryption is 'firmly off' its agenda.

Narinder Purba16 Nov 2015


The security review: ammyy.com malware, child safety in the digital age and email security boost

The security review: ammyy.com malware, child safety in the digital age and email security boost

The security review: ammyy.com malware, child safety in the digital age and email security boost

Not quite sure what were the most interesting and intriguing information security stories of the past week? Not to worry – the security review has you covered.

Editor16 Nov 2015


Cybercrime

Jail for British DDoS attacker, who said too much on Twitter

Jail for British DDoS attacker, who said too much on Twitter

Cybercrime

Jail for British DDoS attacker, who said too much on Twitter

Although it's far from always possible to determine the perpetrators of a denial-of-service attack and bring them to justice, there are plenty of people who have been put behind bars because of this modern-day crime.

Graham Cluley13 Nov 2015


Privacy

Reclaim privacy with operational security says Snowden

Reclaim privacy with operational security says Snowden

Privacy

Reclaim privacy with operational security says Snowden

Edward Snowden has been offering advice on operational security to ordinary people, advocating, among other things, two-factor authentication and encryption.

Narinder Purba13 Nov 2015


Cybercrime

7 things you need to know about car hacking

7 things you need to know about car hacking

Cybercrime

7 things you need to know about car hacking

Car hacking may sound like something out of the latest Die Hard or James Bond film, but it’s newsworthy, real and likely to happen much more regularly in the future. We look at the top facts you need to know about this emerging trend.

Editor13 Nov 2015


Digital Security

Why continuous vulnerability assessments are necessary

Why continuous vulnerability assessments are necessary

Digital Security

Why continuous vulnerability assessments are necessary

The search for an ideal state of security should be a constant pursuit. Continuous vulnerability assessments are therefore a highly recommended practice.

Miguel Ángel Mendoza12 Nov 2015


Kids Online, Video

Child safety in a digital age

Child safety in a digital age

Kids Online, Video

Child safety in a digital age

Editor12 Nov 2015


Apt Activity Report
MDR Protection