• September 01, 2017 01 Sep'17

    Risk & Repeat: Alternative infosec conferences on the rise

    In this week's Risk & Repeat podcast, SearchSecurity editors discuss how smaller, more targeted infosec conferences are making a name for themselves in the shadow of much larger events.

  • August 31, 2017 31 Aug'17

    Spambot email leak compromises 711M records

    An email leak containing 711 million records was found in a breach of a spambot list stored in the Netherlands and included both addresses and passwords used to access email accounts.

  • August 29, 2017 29 Aug'17

    Kaspersky-Russian ties still unclear, despite FBI push

    The specter of Kaspersky-Russian ties has reportedly led to an FBI campaign urging private organizations to drop Kaspersky Lab products; experts urge the FBI to share more evidence.

  • August 25, 2017 25 Aug'17

    Alleged Sakula malware attacker arrested by FBI

    The FBI arrested Chinese national Yu Pingan for alleged involvement with cyberattacks using the Sakula malware, the same malware reportedly used in the OPM breach.

  • August 25, 2017 25 Aug'17

    U.S. government cybersecurity is a mess, according to officials

    News roundup: John McCain, NIAC and others called out the administration for not doing enough on U.S. government cybersecurity. Plus, the Ropemaker exploit alters emails, and more.

  • Sponsored News

    • Why Windows 10? Why Now? A Guide to Migrating Without Hassle

      Is yours one of those organisations that has been on the sidelines for Windows 10 or has migrated only a portion of its user base? If so, your users and IT teams are missing out on a wide range of benefits — including improved security, greater performance, simplified operations and maintenance, and enhanced support for cloud environments. See More

    • Top 4 Ways to Strengthen Security with PC Lifecycle Management

      Security threats are becoming more advanced, targeted and sophisticated. Unfortunately, we see the results in the news regularly, with recent attacks such as WannaCry and Petya crippling organisations worldwide. Endpoints remain by far the No. 1 source of security breaches — for certain types of breaches, 95% occur at the endpoint. See More

    • A Simple Guide to Increasing Productivity and Job Satisfaction Across Your Entire Organisation

      Productivity and job satisfaction are inextricably linked. As the workplace continues to evolve, organisations are under greater pressure than ever to provide users with the tools they need to do their jobs effectively. Employees, contractors, partners and, at times, even customers need to be able to collaborate and communicate from any location using any device. See More

    • Top 6 Ways to Lower TCO Through PC Lifecycle Management

      If you’re in IT, the last thing you probably want is another ROI calculator hyping the latest and greatest technology. We promise not to bore you with that. However, we would be remiss in not informing you — in a simple and straightforward way — about how your organisation can reduce costs through PC lifecycle management. Here are six of the top factors to consider. See More

    View All Sponsored News
  • August 24, 2017 24 Aug'17

    Google Chrome Enterprise adds management options

    The Google Chrome Enterprise offering officially allows organizations to manage Google Play Store apps, extensions, Microsoft Active Directory and integrate VMware on Chromebooks.

  • August 23, 2017 23 Aug'17

    Project Treble is another attempt at faster Android updates

    Google has historically had a problem with getting mobile device manufacturers to push out Android updates, which has left hundreds of millions in the Android ecosystem at risk. Google hopes that ...

  • August 23, 2017 23 Aug'17

    Risk & Repeat: Was the DNC hack an inside job?

    In this week's Risk & Repeat podcast, SearchSecurity editors examine claims from intelligence veterans that the DNC hack was an inside job, and not the work of Russian hackers.

  • August 21, 2017 21 Aug'17

    iPhone Secure Enclave firmware encryption key leaked

    Experts and Apple say despite the leak of the iPhone Secure Enclave Processor encryption key that can be used to decrypt firmware code, user data and biometric information are still safe.

  • August 18, 2017 18 Aug'17

    Valerie Plame: U.S. government cyberdefense must be improved

    Former CIA officer Valerie Plame discusses why America's cyberdefense is lagging behind -- and what the government and private sector should do to reverse the trend.

  • August 18, 2017 18 Aug'17

    Offensive cyberweapons from enemies may be re-engineered

    The U.S. Defense Intelligence Agency wants to isolate, study, customize and re-engineer malware from adversaries to be used as its own offensive cyberweapons.

  • August 18, 2017 18 Aug'17

    Hijacked Chrome extensions infect millions of users

    News roundup: Hackers leveraged eight hijacked Chrome extensions to attack 4.8 million browser users. Plus, Cloudflare stopped protecting a neo-Nazi website from DDoS attacks, and more.

  • August 17, 2017 17 Aug'17

    NotPetya ransomware impact costs Maersk hundreds of millions

    Danish shipping giant A.P. Moller-Maersk said the NotPetya ransomware attacks severely damaged business processes and the impact has been estimated at as much as $300 million in lost revenue.

  • August 17, 2017 17 Aug'17

    Authorities can't force smartphone access in iOS 11

    IOS 11 will allow users to avoid authorities attempting to force smartphone access by temporarily disabling biometric unlocking of mobile devices.

  • August 16, 2017 16 Aug'17

    Risk & Repeat: MalwareTech indictment raises questions

    In this week's Risk & Repeat podcast, SearchSecurity editors explore the FBI's case against security researcher Marcus Hutchins, better known as MalwareTech.