Internet Watch Foundation fights Child Sexual Abuse images online

New IWF move against child sexual abuse

The Internet Watch Foundation (IWF) has announced it is to work more closely with the online industry to speed up the identification and removal of Child Sexual Abuse images online. In a...
Carphone Warehouse suffers serious cyber attack

What has Carphone Warehouse lost?

Over the weekend, Carphone Warehouse admitted that it had suffered a data breach and that the records of a number of customers "may have been accessed." The problem here is the inexact...
IBM Mobilefirst Services for Mac

IBM to offer cloud based services for Macs

For someone who remembers the first IBM PC and the antipathy with which Apple MAC’s were held by those who were "PC first", it seems almost incomprehensible that IBM would now...
NIST Framework used for Cybersecurity Risk Assessment

Free Cybersecurity Risk Assessment tools

According to the 2015 Information Security Breaches survey carried out by PWC 90% of large organisations suffered a security breach over the previous year, up from 81% in the 2014 report....
Terracotta VPN helps spread malware

Terracotta: A VPN behaving badly 

Terracotta is a Virtual Private Network (VPN) built on hacked enterprise Windows servers. Its activities have led security company RSA to issue a warning that it is providing a platform for malware and APT...
Windows 10 Wi-Fi Sense needs a rethink

Windows 10 Wi-Fi Sense raises concerns

As users begin turning up to work with Windows 10 enabled on their BYOD devices, one feature known as Wi-Fi Sense will have IT security teams scrambling to understand the implications for...
Blue Coat and Perspecsys join forces

Blue Coat improves cloud access security

Blue Coat has acquired cloud security provider Perspecsys in order to boost its cloud access security broker (CASB) credentials. Blue Coat already possess a fairly comprehensive security tools portfolio including its own...
HAMMERTOSS activity

HAMMERTOSS spreading via Twitter

HAMMERTOSS is a new piece of malware identified by security specialist FireEye which is spreading via images distributed over Twitter and through code from GitHub. The malware is believed to have originated...
Bromium Exploitation Trends H1 2015

Malvertisements threat from big sites

News and entertainment sites are responsible for more than 50 percent of malvertisements on the web according to security experts Bromium. The report titled Endpoint Exploitation Trends H1 2015 can be downloaded...
AlienVault IDS

AlienVault looks to social threat intelligence

Threat intelligence is all the rage at the moment with security companies as it has the opportunity to speed up the awareness and fixing of security issues. The latest company to upgrade...

LATEST NEWS

Linking ; Image credit -Unsplash.com/bryson-hammer

Linking spreadsheets in Excel 19

A while ago I wrote a tip on how to consolidate two or more spreadsheets together. It occurred to me that maybe some of...
LogChain

LogChain completes international blockchain shipment

LogChain has completed, as part of its pilot program, a full cycle international blockchain-backed maritime shipment. This executed on its end-to-end, digital and tamper-proof...
gpi Link SWIFT r3

SWIFT’s ‘gpi Link’ meets Corda DLT for trade ecosystems

Back in January (2019) SWIFT added a proof of concept (PoC) to trial a new gateway - the 'gpi Link' - with R3's Corda....
Casting Aluminium at Norsk Hydro

Norsk Hydro shutdown by ransomware

Norsk Hydro, one of the largest aluminium producers in the world has been hit by a ransomware attack. The attack has forced the company...

Council of Clerks of Commercial Courts (NCC) deploys IBM-developed blockchain

The French National Council of Clerks (NCC) and IBM have developed a blockchain-based commercial court solution devoted to the clerks of commercial courts' commercial...
SAS invests $1 billion into AI

SAS to invest $1 billion in AI

Analytics vendor SAS is to invest US$1 billion in Artificial Intelligence (AI) over the next three years. The money will be spread across three...
2nd Watch selects RiverMeadow for cloud migration

RiverMeadow helps 2nd Watch migrate to the cloud

2nd Watch is to use RiverMeadow to help migrate client data and apps to the cloud. This deal sees 2nd Watch take advantage of...
Tide Protocol

Tide launches blockchain-based data marketplace 

Tide is a non-profit foundation with a blockchain protocol which seeks to address costly GDPR compliance, compensation and data accuracy issues. Its objective is...
Qlik donates 18 more courses to Data Literacy Project

Qlik boosts Data Literacy Project course library

The Data Literacy Project has just expanded its course library after data analytics vendor Qlik made 18 of its courses available. The project was...
BITC highlights problems with cyber security in SMBs

BITC claims small businesses key to preventing data breaches

Business in the Community (BITC) is claiming that small businesses are the key to preventing data breaches in the future. It's relatively easy to...
NAO slams UK Cyber Security Programme

NAO calls UK Government Cyber Security Programme a farce

In 2016, the government announced it was to invest £1.9 billion in a National Cyber Security Strategy. The announcement came with a lot of...
Certik

CertiK to audit smart contracts on LTO Network

CertiK is introducing an LTO Network Live Contract Audit. The relevant, auditable, Live Contracts run on LTO Network, a hybrid blockchain platform for decentralised...
EQT completes acquisition of SUSE

EQT completes aquisition of SUSE from Micro Focus

EQT Partners has completed its acquisition of SUSE from Micro Focus. The deal was first announced in July 2018 with EQT paying US$2.5 billion...
Columns - image credit / unsplash.com/Héctor J.Rivas

Change and keep column settings in Explorer 10

You would be amazed how many times I get asked this question. “How do I keep the settings of particular columns in Explorer for...