CS Awards 2014
All the winners of the 2014 Computing Security Awards were revealed at an awards ceremony on 9 October to cap another great evening of celebration and industry networking. Almost 250 people attended the ceremony at the Hotel Russell in London where those who had triumphed across the 24 categories were presented with their trophies. |
 |
Anti-Virus, the Cloudmark way
How do you defend against malware that is undetectable once it reaches your computer? Andrew Conway, lead software engineer at Cloudmark, offers some answers |
 |
How safe is your quantified self? We talk to Symantec's Orla Cox about the world of self-tracking, monitoring and wearable technology - and the issues around privacy these raise
|
 |
Bare essentials for Cyber Fightback
With the cost of cybercrime to the UK put at a staggering £27bn per annum, what is being done to protect UK businesses? And is it enough? |
 |
Crime fighters
The need for highly skilled experts to help fight cyber crime has never been so great – or so urgent. Brian Wall reports |
 |
In pursuit of radical change
Tim Ager of Celestix has been working closely with local and regional government organisations to support their transformational objectives
|
 |
Beyond Antivirus
Comodo's Melih Abdulhayoğlu explains his company's unique approach to sandboxing and the powerful protection this delivers
|
 |
Becoming an APT Spycatcher
Cybercrime has become somewhat 'old school' in its approach today, writes Andy Travers, VP EMEA at Fortinet. It's not always about brute force anymore
|
 |
Sparkling outcome!
Casa Vinicola Zonin is one of the most important private wine houses in Italy and one of the foremost in the world, distributing and selling wines and sparkling wines |
|
UK Business - Data at risk
Hold Security has identified a Russian cyber gang now in possession of what it says is the largest cache of stolen data ever
|
|
Kaseya acquires Scorpion Software
Kaseya has acquired Scorpion Software, providers of integrated two factor authentication, single sign on and password management solutions
|
|
Don’t risk data breach penalties
Many are not aware that fines of up to £500,000 can be issued for breaches of the Data Protection Act
|
 |
Ex-employees left with access
UK organisations are failing to deploy vigilant post-termination processes, allowing ex-employees continued access to systems and data
| |
Cyberoam CR35iNG
Cyberoam's latest NG Series of security appliances set themselves apart from the competition, as they deliver the best price/performance ratio
|
|
2014: THE DANGER DEEPENS
Neustar has released its 'Annual United Kingdom DDoS Attacks & Impact Report'. What were the experiences of those surveyed in 2013? The results suggest a more unstable and complex landscape
|
Inside the criminal mind
Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal
|
|
|
|
Welcome to the October 2014 Newsletter.
Even if you had been living in the depths of some dense jungle (are there any left?) or on an Arctic icecap (ditto), you would have heard of the Bash or ShellShock bug by now.
Indeed, at least in security terms, its infamy has circled the globe many times over. So, incidentally, has its impact.
Bash is a system software used by millions of computers servers and devices. It is a part of many Linux systems, as well as Apple's Mac operating system. The actual bug, dubbed Shellshock, can be used to remotely take control of almost any system that is using Bash. The vulnerability has opened up the possibility that an attacker could execute arbitrary commands on any machine running it. The biggest target is web servers.
Patches were being rushed on an almost hourly basis as we went to press and security researchers delving into the Bash codebase were discovering more and more alarming aspects, the deeper they looked.
Where it will end is anyone’s guess. But the likelihood is that the worst is yet to come.
To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.
Brian Wall, Editor
Computing Security
Follow us :
|
|