• Taking Shamima Begum's citizenship risks making her a martyr | Robert Verkaik

    Whatever her alleged crimes, there is every reason to try Shamima Begum in the UK where justice can be seen to be doneThe decision to strip Shamima Begum of her citizenship will turn a young British woman into a martyr.In the same way Guantánamo Bay became a recruiting sergeant for extremism, cases like that of Begum will serve only to radicalise more young British Muslims. Related: Isis Briton Shamima Begum faces move to revoke citizenshipRelated: A British girl has asked to come home. W
  • Palo Alto SOARs into Agreement with Demisto

    Palo Alto SOARs into Agreement with DemistoA definitive acquisition agreement between Palo Alto Networks and Demisto, announced today, is expected to close during the fiscal third quarter for Palo Alto Networks. The acquisition of Demisto will be finalized for a total purchase price of $560 million, according to a press release.The total purchase, to be paid in cash and stock, is subject to adjustment, and the final deal is contingent upon customary closing conditions, including satisfactor
  • Web Application Security Poses Greatest Risk

    Web Application Security Poses Greatest RiskThe majority of vulnerabilities in 2018 were associated with network vulnerabilities, while less than 20% were associated with web applications and APIs, according to the fourth annual Vulnerability Stats Report from Edgescan.When it comes to breaches, though, web application security remains the area of greatest risk. “The percentage of high and critical risks combined, compared to all discovered risks is still high at 19.2% for public internet-
  • Trump is right: it’s our moral duty to take back radicalised Britons | Usama Hasan

    Indoctrinated young people like Shamima Begum need to be shown how Islamic thinking embraces modern nation-statesHow do we deradicalise young, indoctrinated people like Shamima Begum? As part of their ideology, takfiri terrorist groups such as Islamic State and al-Qaida justify their aggression towards the west by creating a divide between Muslims and non-Muslims. They argue that the modern nation-state model of governance is incompatible with Islamic principles, and that the Muslim world must b
  • Advertisement

  • How would I deradicalise Shamima Begum? With Islamic scholarship | Usama Hasan

    As an imam, I have helped indoctrinated young people to see the errors of a medieval, misguided and misapplied worldviewHow do we deradicalise young, indoctrinated people like Shamima Begum? As part of their ideology, takfiri terrorist groups such as Islamic State and al-Qaida justify their aggression towards the west by creating a divide between Muslims and non-Muslims. They argue that the modern nation-state model of governance is incompatible with Islamic principles, and that the Muslim world
  • Student Data Exposed at Stanford University

    Student Data Exposed at Stanford UniversityThe private data of students at Stanford University was exposed after someone changed a numeric ID in a URL that had been distributed to students who requested access to review their own files, according to The Stanford Daily.In total, 93 students have been notified that their privacy was compromised. According to the report, a university student made a Family Educational Rights and Privacy Act (FERPA) request to view their admissions documents, no
  • #CPX360: Attackers Are Delighted by the Expanding Attack Surface

    #CPX360: Attackers Are Delighted by the Expanding Attack SurfaceEthical hackers have to “pretend and think like a criminal” as attackers think in the opposite way that a defender thinks. Speaking at Check Point Experience in Vienna, ethical hacker and Cygenta co-founder Freaky Clown (FC) said that he is driven by trust issues, and stated he “trusts nothing unless I understand it fully, and I untrust everything to the nth degree, and then I trust it.”FC pointed t
  • Europe Intros Global IoT Security Standard

    Europe Intros Global IoT Security StandardExperts have welcomed the introduction of a new globally applicable European standard designed to drive improvements in baseline security for consumer-grade IoT products.Introduced today by the European Telecommunications Standards Institute (ETSI), the standard will hopefully encourage manufacturers to improve built-in privacy and security protections whilst providing consumers with a way of differentiating between products on the market.The ETSI T
  • Advertisement

  • #CPX360: Prepare for Next Generation of Attacks with Prevention Focus

    #CPX360: Prepare for Next Generation of Attacks with Prevention FocusSpeaking at the Check Point Experience conference in Vienna, Check Point founder and CEO Gil Shwed reflected on the first 25 years of the company, saying it had “come a long way” in protecting the internet.Shwed said that the company's first few years were spent “trying to convince people on the power of the internet and I'm glad we insisted and stayed the course and took Check Point to where it is” as w
  • Iran Unveils ‘Cruise-Missile Equipped’ Submarine

    According to Iranian state media, President Hassan Rohani has inaugurated a new domestically built submarine armed with cruise missiles, amid heightened tensions with the United States. “Today,...
  • Russian State Hackers Take Minutes to Move Laterally

    Russian State Hackers Take Minutes to Move LaterallyThere was a major rise in Chinese state-sponsored cyber-activity in 2018 while Russian actors were by far the most operationally effective, according to the latest report from CrowdStrike.The security vendor’s 2019 Global Threat Report tracked the relatively new metric of “breakout time” which measures how quickly a hacker manages lateral movement following an initial incursion. In so doing, CrowdStrike believes IT teams will
  • Sweden’s Patient Hotline in Major Privacy Snafu

    Sweden’s Patient Hotline in Major Privacy SnafuMillions of highly sensitive audio files linked to a Swedish healthcare hotline have been left exposed online for several years, in what could be a major breach of the GDPR.The 2.7 million files in question amount to 170,000 hours of calls, dating back to 2013 and left on an open Apache web server with no password protection, according to local reports.The calls, recorded for quality assurance purposes, detail highly sensitive information

Follow @Security_UKnws on Twitter!