11.5 C
London
Sunday, October 22, 2017

FBI Ransomware Now Targeting Apple’s Mac OS X Users

Note: this is a JavaScript attack which works on Apple Mac / OS X, this is not an Apple Mac Trojan (binary). For years, Windows...

Lulzsec hacker group handed jail sentences

Lulzsec hacker group handed jail sentences LulzSec hacker Jake Davis: 'The internet is a world devoid of empathy' British hackers who were behind a series of...

Facebook Security Infographic

In this infographic you can find out more about our security infrastructure and an overview of the tools available to all our users to...

Sneaky new Android Trojan is WORST yet discovered

Security researchers at Kaspersky Lab report that a recently discovered Android Trojan is the most sophisticated such mobile malware yet to be identified. In a...

New proof-of-concept malware demonstrates virus for OS X

Security researchers have found a proof-of-concept attack that appears to be the first true viral malware approach for compromising OS X. The malware is called...

Six Simple Steps to Enterprise Risk Management

Enterprise risk management is a scalable, holistic approach to improved decision-making that consolidates and organizes risk information from across an organization. No longer limited to a risk manager’s monthly report, ERM is becoming a fundamental part of business success.

By embracing ERM and creating a risk management culture, organizations can drive business performance, innovation and growth, while protecting company reputation and shareholder value. For many businesses, demonstrating that they have a clear, auditable risk management process has become a critical factor in winning new business. Unfortunately, too many business leaders still perceive risk management as a complex undertaking.
In reality, there are six simple steps to follow for effective risk management, – regardless of the industry, vertical, size or scope of the project or company.

Security Twitteratti: Twitter’s 2FA does sweet FA for biz

Security-watchers don't appear overly impressed with Twitter's introduction of two-factor authentication (2FA) to its service. While some infosec experts welcomed the move, others argued that...

At Infosecurity Europe 2014 in London

We are visiting the infosecurity Europe 2014 event at Earls Court in London. We will be providing updates on key aspects of the event.