Publication: Latest articles from SC Magazine UK News

First reported 2 hours ago - Updated 2 hours ago - 1 reports

Insiders can use whistleblowing tools to steal data without a trail

The tools exist to by-pass many data leakage programmes and facilitate mass exfiltration of data, so enable internal whistelblowing - to avoid external access says Edward Parsons. ... [Published Latest articles from SC Magazine UK News - 2 hours ago]
First reported 22 hours ago - Updated 7 hours ago - 1 reports

MH17 spammers direct Twitter users to Zeus-ridden websites

In the aftermath of the MH17 tragedy which saw almost 300 people lose their lives in an airplane crash over Ukraine, cyber-criminals are taking advantage by leading social media users to malicious websites. ... [Published Latest articles from SC Magazine UK News - 22 hours ago]
First reported Jul 21 2014 - Updated 21 hours ago - 1 reports

EU's new cybercrime taskforce set to launch

Andy Archibald, deputy head of the UK's National Cyber Crime Unit (NCCU), is to chair a new cyber-crime taskforce based out of the European Cybercrime Centre (EC3) in The Hague in Netherlands. ... [Published Latest articles from SC Magazine UK News - Jul 21 2014]
First reported 23 hours ago - Updated 23 hours ago - 1 reports

Know thy neighbour: Dealing with third-party cyber attacks

It'd not enough to protect your own network, you aslo have to be prepared to cope with third party negligence says Brian Foster. ... [Published Latest articles from SC Magazine UK News - 23 hours ago]
First reported Jul 18 2014 - Updated Jul 19 2014 - 1 reports

Criminals get hold of 'Russian state malware'

One of the first cases of government-grade malware falling into the hands of common cyber criminals has been uncovered by US security firm Sentinel Labs. ... [Published Latest articles from SC Magazine UK News - Jul 18 2014]
First reported Jul 18 2014 - Updated Jul 18 2014 - 1 reports

ICYMI: Google's Project Zero, ICO breach & sharing intel on critical infrastructure

This week's In Case You Missed It (ICYMI) column takes a look at Google's Project Zero, accusations of double-standards at the ICO and the need to share intelligence on critical infrastructure. ... [Published Latest articles from SC Magazine UK News - Jul 18 2014]
First reported Jul 18 2014 - Updated Jul 18 2014 - 1 reports

The 5 most read articles this week: July 11-17

Here are the five most popular SC articles, as seen by you the reader, in the week for July 11 to 17. ... [Published Latest articles from SC Magazine UK News - Jul 18 2014]
First reported Jul 18 2014 - Updated Jul 18 2014 - 1 reports

EC3 aids Romanian cybercriminal network takedown

First reported Jul 18 2014 - Updated Jul 18 2014 - 1 reports

Snowden calls on businesses to encrypt data, shun Dropbox

UK cyber experts side with NSA whistle-blower who urges companies to adopt encryption and to shun Dropbox because the cloud storage company is 'hostile to privacy'. ... [Published Latest articles from SC Magazine UK News - Jul 18 2014]
First reported Jul 17 2014 - Updated Jul 18 2014 - 1 reports

Embedded WinXP systems targeted by new Chinese malware

Chinese firm uses unusual techniques to infected legacy computer systems ... [Published Latest articles from SC Magazine UK News - Jul 17 2014]
Entities: Malware, Infectious
First reported Jul 17 2014 - Updated Jul 17 2014 - 1 reports

Android apps too free and easy with access permissions

Android apps ask for far too many device and data permissions, with 68 percent of 75,000 apps scanned requiring the ability to generate text messages, according to new research. ... [Published Latest articles from SC Magazine UK News - Jul 17 2014]
Entities: Tolerance, Android
First reported Jul 17 2014 - Updated Jul 17 2014 - 1 reports

Embedded Windows XP systems targeted by new Chinese malware

Chinese firm uses unusual techniques to infected legacy computer systems. ... [Published Latest articles from SC Magazine UK News - Jul 17 2014]

Quotes

"Fighting off an APT attack using firewalls and anti-virus is akin to shooting at a nuclear warhead with a bow and arrow."
"Anyone with an understanding of embedded systems could develop the technology to hibernate, rather than switch off, the handset" - Rob Bamforth, Quocirca

More Content

All (423) | News (0) | Reports (0) | Blogs (421) | Audio/Video (0) | Fact Sheets (0) | Press Releases (0)
sort by: Date | Relevance
Insiders can use whistleblowing tools to steal ... [Published Latest articles from SC Magazine UK News - 2 hours ago]
MH17 spammers direct Twitter users to Zeus-ridd... [Published Latest articles from SC Magazine UK News - 22 hours ago]
Know thy neighbour: Dealing with third-party cy... [Published Latest articles from SC Magazine UK News - 23 hours ago]
EU's new cybercrime taskforce set to launch [Published Latest articles from SC Magazine UK News - Jul 21 2014]
The 5 most read articles this week: July 11-17 [Published Latest articles from SC Magazine UK News - Jul 18 2014]
Criminals get hold of 'Russian state malware' [Published Latest articles from SC Magazine UK News - Jul 18 2014]
ICYMI: Google's Project Zero, ICO breach & shar... [Published Latest articles from SC Magazine UK News - Jul 18 2014]
Snowden calls on businesses to encrypt data, sh... [Published Latest articles from SC Magazine UK News - Jul 18 2014]
EC3 aids Romanian cybercriminal network takedown [Published Latest articles from SC Magazine UK News - Jul 18 2014]
Android apps too free and easy with access perm... [Published Latest articles from SC Magazine UK News - Jul 17 2014]
Embedded Windows XP systems targeted by new Chi... [Published Latest articles from SC Magazine UK News - Jul 17 2014]
Embedded WinXP systems targeted by new Chinese ... [Published Latest articles from SC Magazine UK News - Jul 17 2014]
Controversial DRIP bill set to become UK law [Published Latest articles from SC Magazine UK News - Jul 17 2014]
eBay counts the cost after 'challenging' data b... [Published Latest articles from SC Magazine UK News - Jul 17 2014]
IT security pros prioritise new tech over training [Published Latest articles from SC Magazine UK News - Jul 17 2014]
NIST to NSA: get your hands off our encryption ... [Published Latest articles from SC Magazine UK News - Jul 16 2014]
German loss of trust heralds return of typewriters [Published Latest articles from SC Magazine UK News - Jul 16 2014]
Security vulnerabilities found on password mana... [Published Latest articles from SC Magazine UK News - Jul 16 2014]
Regulatory compliance and risk includes third-p... [Published Latest articles from SC Magazine UK News - Jul 16 2014]
Amazon triples malware hosting in six months [Published Latest articles from SC Magazine UK News - Jul 15 2014]
Conference report*: Intelligence services share... [Published Latest articles from SC Magazine UK News - Jul 15 2014]
CISOs breaking free from IT control, missing bo... [Published Latest articles from SC Magazine UK News - Jul 15 2014]
CNET loses data on 1 million users [Published Latest articles from SC Magazine UK News - Jul 15 2014]
CNET loses data on 1 million security pros [Published Latest articles from SC Magazine UK News - Jul 15 2014]
Pitty Tiger APT exploits older version Office f... [Published Latest articles from SC Magazine UK News - Jul 15 2014]
ICO wants more power as privacy complaints hit ... [Published Latest articles from SC Magazine UK News - Jul 15 2014]
CISOs still grappling with security awareness t... [Published Latest articles from SC Magazine UK News - Jul 14 2014]
British PM promises £800 million cyber defence ... [Published Latest articles from SC Magazine UK News - Jul 14 2014]
The need for resilience [Published Latest articles from SC Magazine UK News - Jul 14 2014]
Game on for Gameover? [Published Latest articles from SC Magazine UK News - Jul 11 2014]
1 2 3 4 5 6 7 8 9 10 ...
In Focus
  •  
  •  
  •  
  •  
  •  
  •  
  •  
  •  
Content Volume
Document Volume
Network
Network

Blogs

sort by: Date | Relevance
Insiders can use whistleblowing tools to steal ... [Published Latest articles from SC Magazine UK News - 2 hours ago]
The tools exist to by-pass many data leakage programmes and facilitate mass exfiltration of data, so enable internal whistelblowing - to avoid external access says Edward Parsons. ...
MH17 spammers direct Twitter users to Zeus-ridd... [Published Latest articles from SC Magazine UK News - 22 hours ago]
In the aftermath of the MH17 tragedy which saw almost 300 people lose their lives in an airplane crash over Ukraine, cyber-criminals are taking advantage by leading social media users to malicious websites. ...
Know thy neighbour: Dealing with third-party cy... [Published Latest articles from SC Magazine UK News - 23 hours ago]
It'd not enough to protect your own network, you aslo have to be prepared to cope with third party negligence says Brian Foster. ...
EU's new cybercrime taskforce set to launch [Published Latest articles from SC Magazine UK News - Jul 21 2014]
Andy Archibald, deputy head of the UK's National Cyber Crime Unit (NCCU), is to chair a new cyber-crime taskforce based out of the European Cybercrime Centre (EC3) in The Hague in Netherlands. ...
The 5 most read articles this week: July 11-17 [Published Latest articles from SC Magazine UK News - Jul 18 2014]
Here are the five most popular SC articles, as seen by you the reader, in the week for July 11 to 17. ...
1 2 3 4 5 6 7 8 9 10 ...
Contact Us
Sales
Support


Freebase CC-BY Some image thumbnails are sourced from Freebase, licensed under CC-BY

Copyright (C) 2014 Silobreaker Ltd. All rights reserved.
The selection and placement of stories and images on any Silobreaker page are determined automatically by a computer program.
The time or date displayed reflects when an article was added to or updated in Silobreaker.