If you cannot view this email please click here

BYOD

Passwords

Hacking Cloud Compliance Reviews

Features


CS Awards 2014

All the winners of the 2014 Computing Security Awards were revealed at an awards ceremony on 9 October to cap another great evening of celebration and industry networking. Almost 250 people attended the ceremony at the Hotel Russell in London where those who had triumphed across the 24 categories were presented with their trophies.

main headline

Anti-Virus, the Cloudmark way

How do you defend against malware that is undetectable once it reaches your computer? Andrew Conway, lead software engineer at Cloudmark, offers some answers

main headline

How safe is your quantified self?

We talk to Symantec's Orla Cox about the world of self-tracking, monitoring and wearable technology - and the issues around privacy these raise

main headline

Bare essentials for Cyber Fightback

With the cost of cybercrime to the UK put at a staggering £27bn per annum, what is being done to protect UK businesses? And is it enough?

main headline

Crime fighters

The need for highly skilled experts to help fight cyber crime has never been so great – or so urgent. Brian Wall reports

main headline

Masterclass

In pursuit of radical change

Tim Ager of Celestix has been working closely with local and regional government organisations to support their transformational objectives

main headline

Opinion

Beyond Antivirus

Comodo's Melih Abdulhayoğlu explains his company's unique approach to sandboxing and the powerful protection this delivers

main headline

Becoming an APT Spycatcher

Cybercrime has become somewhat 'old school' in its approach today, writes Andy Travers, VP EMEA at Fortinet. It's not always about brute force anymore

main headline

Case Study

Sparkling outcome!

Casa Vinicola Zonin is one of the most important private wine houses in Italy and one of the foremost in the world, distributing and selling wines and sparkling wines

main headline

News

UK Business - Data at risk

Hold Security has identified a Russian cyber gang now in possession of what it says is the largest cache of stolen data ever

Kaseya acquires Scorpion Software

Kaseya has acquired Scorpion Software, providers of integrated two factor authentication, single sign on and password management solutions

Don’t risk data breach penalties

Many are not aware that fines of up to £500,000 can be issued for breaches of the Data Protection Act

main headline

Ex-employees left with access

UK organisations are failing to deploy vigilant post-termination processes, allowing ex-employees continued access to systems and data

All tooled up to create Havoc

An SQL injection flaw in a Wall Street Journal database that led to a breach has prompted a backlash

main headline

Malicious insiders pose biggest threat

20% of organisations believe malicious insiders pose the biggest threat to their security

main headline

Review

Cyberoam CR35iNG

Cyberoam's latest NG Series of security appliances set themselves apart from the competition, as they deliver the best price/performance ratio

main headline

White papers

2014: THE DANGER DEEPENS

Neustar has released its 'Annual United Kingdom DDoS Attacks & Impact Report'. What were the experiences of those surveyed in 2013? The results suggest a more unstable and complex landscape

Password Protected: A Survey On Two-Factor Authentication

The background to eliminating insecure passwords

Cloud-Based Services: Easing The I.T Burden While Taking Control

The potential benefits of employing cloud-based services, either in place of existing IT resources or alongside them, are undoubtedly significant, as this white paper from GFI Cloud makes clear.

Inside the criminal mind

Infoblox has launched a whitepaper that takes a sideways look at DNS security from the perspective of a cybercriminal

Welcome to the October 2014 Newsletter.

Even if you had been living in the depths of some dense jungle (are there any left?) or on an Arctic icecap (ditto), you would have heard of the Bash or ShellShock bug by now.

Indeed, at least in security terms, its infamy has circled the globe many times over. So, incidentally, has its impact.

Bash is a system software used by millions of computers servers and devices. It is a part of many Linux systems, as well as Apple's Mac operating system. The actual bug, dubbed Shellshock, can be used to remotely take control of almost any system that is using Bash. The vulnerability has opened up the possibility that an attacker could execute arbitrary commands on any machine running it. The biggest target is web servers.

Patches were being rushed on an almost hourly basis as we went to press and security researchers delving into the Bash codebase were discovering more and more alarming aspects, the deeper they looked.

Where it will end is anyone’s guess. But the likelihood is that the worst is yet to come.

To make sure you get your copy of the Newsletter emailed to you personally, every time, click here to register.

Brian Wall, Editor
Computing Security

Follow us :

 

 

 

To unsubscribe click here

Published by: BTC 35 Station Square Petts Wood BR5 1LZ

Tel: +44 (0) 1689 616 000
Fax: +44 ( 0) 1689 826 622