Analysis

Cyber criminals increasingly favouring 'low and slow' stealth attacks

A "low and slow" approach to financially driven cyber attacks has overtaken ransomware as the chief attack vector for criminals seeking to extort money by stealth using crypto mining-based malware, according to research by British cybersecurity upstart Darktrace.

Are cybersecurity gender diversity programs losing steam?

Cybersecurity has long been a male dominated field. According to an ISACA survey, 89 per cent of respondents said there were more men than women in cyber roles in their companies. Some 15 percent of the 1,500 ISACA certified respondents said they worked in organisations where the entire security function was male.

Password managers remain an important security tool despite new vulnerability report

Experts downplay discovery of a vulnerability that can expose passwords in a computer's memory. Hackers likely to take easier paths to stealing passwords.

The cybersecurity legislation agenda: 5 areas to watch

The 116th Congress is only a few months old, but far-reaching cybersecurity bills to protect infrastructure and the supply chain, ensure election integrity, and build a security workforce are now being considered. Here’s the list.

Add cybersecurity to Doomsday Clock concerns, says Bulletin of Atomic Scientists

The Doomsday Clock, once a ritual feature of the Cold War, warns that cybersecurity issues like IoT and cyber-enabled information warfare endanger humanity.

ICANN housecleaning will revoke old DNS security key this week

ICANN will complete the switchover this week to a new internet security key that protects DNS, the internet's address book. The old Root Key Signing Key will be decomissioned Jan. 10.

Cybersecurity trends that 2019 might hold for us

With the cyber security industrial complex in full swing and good business for all the major players, from governments and state sponsored groups, to criminal attackers and the vendors as well as their shareholders, we wonder what horrors this dystopian hell world will spew forth next.

Live hacking to rise in 2019: Report

‘Live hacking’ will become more popular as attacks that originate in this way don’t require traditional software packages that can be detected or destroyed.

Why one MSP is building a security strategy with Sophos

As 2018 comes to a close, the channel is still clearing up the security mess of 2017, a year in which an unprecedented number of attacks reached local shores.

Google+ data breach: You should probably delete your profile right now

Google has announced another Google+ data breach, this time affecting more than 50 million users. So here's how to shut down your profile for good.

Huawei security fears - paranoia, blowback, or both?

BT has made the decision to strip the equipment of Huawei from its core EE 4G network among growing security concerns about the Chinese telecom infrastructure giant's critical infrastructure footprint. 

Marriott Starwood data breach: What 500 million hacked guests need to know

Marriott has announced a database breach affecting some 500 million of its customers. Here's everything you need to know.