Publication: Latest articles from SC Magazine UK News

First reported 15 hours ago - Updated 7 hours ago - 1 reports

TripAdvisor subsidiary data breach hits up to 1.4 million customers

Travel firm Viator has suffered a data breach that has compromised the credentials or payment card details of up to 1.4 million of its customers. ... [Published Latest articles from SC Magazine UK News - 15 hours ago]
First reported 11 hours ago - Updated 11 hours ago - 1 reports

New cyber training facility launched

Entities: Cyber, Training
First reported 13 hours ago - Updated 13 hours ago - 1 reports

Russia's BlackEnergy malware targets Brussels, Poland and Ukraine

Ongoing Russian malware attacks on Poland, Ukraine and Brussels (in Belgium) are aimed at discovering secrets not cash, and could be from criminal groups rather than a state-sponsored actor. ... [Published Latest articles from SC Magazine UK News - 13 hours ago]
First reported Sep 22 2014 - Updated 15 hours ago - 1 reports

More celebrity pictures revealed: Apple and FBI investigating

Celebgate 2: a depressing weekend for some celebrities as more hacked pictures leaked from iCloud. ... [Published Latest articles from SC Magazine UK News - Sep 22 2014]
First reported 17 hours ago - Updated 17 hours ago - 1 reports

EU and UK step up efforts to protect banks from cybercrime

The European Union and the British Bankers' Association have announced independent plans to tackle cyber-criminals that target banks and other financial institutions. ... [Published Latest articles from SC Magazine UK News - 17 hours ago]
First reported 23 hours ago - Updated 23 hours ago - 1 reports

Fighting the fraudsters: Why we must get better at data sharing

Face-to-face information-sharing with peers is a vital route to learn industry fraud-prevention lessons says Tim Lansdale. ... [Published Latest articles from SC Magazine UK News - 23 hours ago]
First reported Sep 22 2014 - Updated Sep 22 2014 - 1 reports

New legislation calls to limit scope of US search warrants

First reported Sep 22 2014 - Updated Sep 22 2014 - 2 reports

Microsoft closes Trustworthy Computing as part of layoff strategy

In a surprise move, Microsoft has effectively closed its Trustworthy Computing (TwC) Group as part of the loss of 2,100 jobs in a restructuring plan announced late last week. ... [Published Latest articles from SC Magazine UK News - Sep 22 2014]
First reported Sep 22 2014 - Updated Sep 22 2014 - 1 reports

Home Depot card data breach undetected for four months

The Home Depot card data breach may have continued for longer than the Target attack late last year, according to new reports. ... [Published Latest articles from SC Magazine UK News - Sep 22 2014]
First reported Sep 22 2014 - Updated Sep 22 2014 - 2 reports

Jihadists didn't increase security due to NSA leaks

First reported Sep 22 2014 - Updated Sep 22 2014 - 2 reports

Average intrusion prevention product 94% effective

First reported Sep 19 2014 - Updated Sep 19 2014 - 2 reports

Lessons learned from China's cyberattacks

Entities: Cyber Attack, China

Quotes

More Content

All (640) | News (0) | Reports (0) | Blogs (639) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
New cyber training facility launched [Published Latest articles from SC Magazine UK News - 11 hours ago]
Russia's BlackEnergy malware targets Brussels, ... [Published Latest articles from SC Magazine UK News - 13 hours ago]
TripAdvisor subsidiary data breach hits up to 1... [Published Latest articles from SC Magazine UK News - 15 hours ago]
EU and UK step up efforts to protect banks from... [Published Latest articles from SC Magazine UK News - 17 hours ago]
Fighting the fraudsters: Why we must get better... [Published Latest articles from SC Magazine UK News - 23 hours ago]
New legislation calls to limit scope of US sear... [Published Latest articles from SC Magazine UK News - Sep 22 2014]
Home Depot card data breach undetected for four... [Published Latest articles from SC Magazine UK News - Sep 22 2014]
Microsoft closes Trustworthy Computing as part ... [Published Latest articles from SC Magazine UK News - Sep 22 2014]
Microsoft closesTrustworthy Computing as part o... [Published Latest articles from SC Magazine UK News - Sep 22 2014]
Jihadists didn't increase security due to NSA l... [Published Latest articles from SC Magazine UK News - Sep 22 2014]
Jihadists didn't increase communication securit... [Published Latest articles from SC Magazine UK News - Sep 22 2014]
More celebrity pictures revealed: Apple and FBI... [Published Latest articles from SC Magazine UK News - Sep 22 2014]
Average intrusion prevention product 94% effective [Published Latest articles from SC Magazine UK News - Sep 22 2014]
The average intrusion prevention product is 94%... [Published Latest articles from SC Magazine UK News - Sep 22 2014]
Lessons learned from China's cyberattacks [Published Latest articles from SC Magazine UK News - Sep 19 2014]
Lessons learned from China's cyberattacks again... [Published Latest articles from SC Magazine UK News - Sep 19 2014]
Russian cyber attack exploits Scottish independ... [Published Latest articles from SC Magazine UK News - Sep 19 2014]
China responsible for multiple US military brea... [Published Latest articles from SC Magazine UK News - Sep 18 2014]
Card and banking fraud back on the rise again [Published Latest articles from SC Magazine UK News - Sep 18 2014]
The (grim) reality of password security [Published Latest articles from SC Magazine UK News - Sep 18 2014]
Third Cyber Essentials accreditation body autho... [Published Latest articles from SC Magazine UK News - Sep 18 2014]
eBay downplays significance of `old school' XSS... [Published Latest articles from SC Magazine UK News - Sep 18 2014]
Most European businesses don't trust cloud serv... [Published Latest articles from SC Magazine UK News - Sep 18 2014]
Cybersecurity plans still lacking in big busine... [Published Latest articles from SC Magazine UK News - Sep 17 2014]
Defending Critical Infrastructure: only 6% of i... [Published Latest articles from SC Magazine UK News - Sep 17 2014]
Scammers tap the power of Facebook to offer `fr... [Published Latest articles from SC Magazine UK News - Sep 17 2014]
FBI's facial and fingerprint super-database goe... [Published Latest articles from SC Magazine UK News - Sep 17 2014]
IPhone thermal technology used for for PIN theft [Published Latest articles from SC Magazine UK News - Sep 17 2014]
Serious browser vulnerability affects majority ... [Published Latest articles from SC Magazine UK News - Sep 16 2014]
Banking Trojans target energy sector as APTs [Published Latest articles from SC Magazine UK News - Sep 16 2014]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
New cyber training facility launched [Published Latest articles from SC Magazine UK News - 11 hours ago]
Russia's BlackEnergy malware targets Brussels, ... [Published Latest articles from SC Magazine UK News - 13 hours ago]
Ongoing Russian malware attacks on Poland, Ukraine and Brussels (in Belgium) are aimed at discovering secrets not cash, and could be from criminal groups rather than a state-sponsored actor. ...
TripAdvisor subsidiary data breach hits up to 1... [Published Latest articles from SC Magazine UK News - 15 hours ago]
Travel firm Viator has suffered a data breach that has compromised the credentials or payment card details of up to 1.4 million of its customers. ...
EU and UK step up efforts to protect banks from... [Published Latest articles from SC Magazine UK News - 17 hours ago]
The European Union and the British Bankers' Association have announced independent plans to tackle cyber-criminals that target banks and other financial institutions. ...
Fighting the fraudsters: Why we must get better... [Published Latest articles from SC Magazine UK News - 23 hours ago]
Face-to-face information-sharing with peers is a vital route to learn industry fraud-prevention lessons says Tim Lansdale. ...
1 2 3 4 5 6 7 8 9 10 ...
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.