News
IT security
-
April 14, 2015
14
Apr'15
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers
-
April 10, 2015
10
Apr'15
French TV5Monde network cyber attack the latest in destructive trend in system intrusions
The cyber attack on French television network TV5Monde is the latest in a growing list of incursions intended to destroy data and IT systems
-
April 08, 2015
08
Apr'15
Exit checks system for UK borders finally goes live
The Home Office launches a system for making exit checks of travellers at UK borders, following the scrapped e-Borders programme
-
April 08, 2015
08
Apr'15
Alleged White House hack highlights typical security failings, say experts
The alleged penetration of sensitive White House computer networks highlights typical security failings, say information security experts
-
April 08, 2015
08
Apr'15
CIO interview: Bruna Pellicci, global head of IT, Ashurst
Global law firm Ashurst is rolling out a new IT strategy based on single platforms worldwide for its core business areas
-
March 31, 2015
31
Mar'15
AWS gets EU approval for data replication outside of Europe
The European Union Data Protection Authorities has approved Amazon Web Services’ Data Processing Agreement
-
March 31, 2015
31
Mar'15
DDoS losses potentially £100k an hour, survey shows
DDoS attacks could expose 40% of businesses to losses of £100,000 or more an hour at peak times, a survey shows
-
March 30, 2015
30
Mar'15
British Airways rewards scheme hack highlights password problem
The hacking of British Airways’ executive club frequent flyer accounts shows the importance of using strong, unique passwords for all online accounts
-
March 26, 2015
26
Mar'15
Samsung targets business with Microsoft tools integration
Samsung has pre-installed Microsoft OneNote, OneDrive, and Skype on the new Galaxy S6 and Galaxy S6 edge, as it expands into business
-
March 26, 2015
26
Mar'15
UK attacks on crypto keys and digital certificates endemic
All UK security professionals polled in a global survey have responded to attacks on keys and certificates in past two years
-
March 25, 2015
25
Mar'15
UK government adds five authentication providers to Gov.uk Verify identity management system
The Government Digital Service (GDS) adds five authentication providers to the Gov.uk Verify identity and access management scheme
-
March 25, 2015
25
Mar'15
Identity fraud still top UK fraud threat
Identity fraud continues to be the single biggest fraud threat, according to the latest report by UK fraud prevention service Cifas
-
March 24, 2015
24
Mar'15
Google warns of fake digital certificates
Google has warned of unauthorised digital certificates issued for several of its domains that could be used to intercept data traffic
-
March 20, 2015
20
Mar'15
Home devices threaten enterprise data security, warn researchers
Poor or lacking security on ADSL routers and other devices used by teleworkers a threat to global enterprise information security
-
March 19, 2015
19
Mar'15
Target agrees to $10m breach compensation
US retailer Target has agreed to a $10m compensation package for victims of its 2013 data breach
-
March 18, 2015
18
Mar'15
Ford drives connected car journey with Microsoft Azure
The Microsoft Azure cloud will be used to power Ford's new software delivery and vehicle monitoring service
-
March 18, 2015
18
Mar'15
Premera hack exposes 11 million financial and medical records
US health insurance firm Premera Blue Cross reveals an IT systems breach, exposing financial and medical records of 11 million customers
-
March 17, 2015
17
Mar'15
Microsoft warns of fake SSL certificate for Windows Live
Microsoft has warned that a fake security certificate has been issued for the Windows Live domain that could be abused by attackers
-
March 13, 2015
13
Mar'15
Lookout bets on big data analytics to secure enterprise mobiles
Mobile security SaaS provider Lookout is betting on its cloud-based big data analytics capability to attract enterprise customers
-
March 13, 2015
13
Mar'15
Japan recruits hackers for cyber security force
The Japanese government plans to recruit hackers to identify and protect against cyber security threats
-
March 11, 2015
11
Mar'15
Why IAM is topping security investments in 2015
It is not surprising identity and access management (IAM) is set to move to the fore in 2015
-
March 09, 2015
09
Mar'15
US cyber crime indictment prompts calls for zero tolerance
A newly-revealed US indictment of three suspected cyber criminals has prompted a call for zero tolerance for cyber intrusions
-
March 09, 2015
09
Mar'15
Group claiming links to Isis hacks small business websites
The FBI is investigating the hacking of a number of SME websites in the US and Europe by people claiming affiliation with Islamic State
-
March 09, 2015
09
Mar'15
2015 IT priorities: SDN yet to prove itself, fear of network hacks growing
In Computer Weekly’s 2015 IT priorities study, software-defined networking is still behind management and monitoring as a networking priority
-
March 06, 2015
06
Mar'15
How to ensure your hot-desking colleagues keep their data secure
Once hot-desking is implemented, data security suddenly demands greater attention
-
March 05, 2015
05
Mar'15
China and US cross swords over software backdoors
Barack Obama criticises Chinese plans to force tech firms trading in China to share encryption keys and put backdoors in software
-
February 27, 2015
27
Feb'15
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system
-
February 26, 2015
26
Feb'15
Cloud security still needs a lot more work, say European experts
Security and privacy remain a stumbling block for cloud computing, according to information experts at the Trust in the Digital World conference
-
February 25, 2015
25
Feb'15
RASP helps apps protect themselves, but is it ready for the enterprise?
A new technology called runtime application self-protection is being touted as a next big thing in application security. But not everyone is singing its praises.
-
February 24, 2015
24
Feb'15
UK consumers lack confidence in data protection, study finds
UK consumers do not believe businesses or governments do enough to protect their data, according to to Symantec’s State of Privacy report
-
February 24, 2015
24
Feb'15
PrivDog SSL compromise potentially worse than Superfish
Some versions of PrivDog software designed to block online ads compromise internet security in a similar way to Superfish
-
February 20, 2015
20
Feb'15
BlackBerry 10.3.1 review: Access Android apps and Blend
BlackBerry has finally released version 10.3.1 of its mobile operating system, which gives access to the Amazon Android app store
-
February 19, 2015
19
Feb'15
Intel Security warns of six social engineering techniques targeting businesses
An Intel Security report encourages businesses to address and educate employees on “six levers of influence” used by hackers
-
February 17, 2015
17
Feb'15
International spyware operation linked to NSA
The US National Security Agency has reportedly hidden surveillance software in the hard drives of several top computer makers
-
February 16, 2015
16
Feb'15
MasterCard to pilot facial, voice and fingerprint authentication
MasterCard will pilot a biometric authentication and verification tool this year as part of cyber security technology investment
-
February 16, 2015
16
Feb'15
$1bn cyber heist underlines need for detection, say security experts
The theft of up to $1bn from financial institutions in a daring cyber crime operation underlines the need for monitoring, say security experts
-
February 12, 2015
12
Feb'15
Damballa report highlights the limitations of prevention-centric security
Anti-virus (AV) suppliers can take more than six months to create signatures for malware, according to a report from security firm Damballa
-
February 11, 2015
11
Feb'15
General election 2015: Major parties focus on tech agenda
With advancements around data protection and state surveillance of internet traffic, the UK is heading into its first tech-aware general election
-
February 06, 2015
06
Feb'15
Symantec continues cloud investment in spite of poor Q3 results
Symantec has reported third quarter 2015 revenue of $1.64bn, a drop of 4% compared with $1.70bn over the same period in 2014
-
February 06, 2015
06
Feb'15
National Police ICT Company finally set to start operations
A national Police ICT Company is set to begin operations after finally being approved by the UK’s police and crime commissioners
-
February 06, 2015
06
Feb'15
Sony data breach claims first scalp as co-chair steps down
Amy Pascal, co-chair of Sony Pictures Entertainment, steps down in wake of data breach that exposed "inappropriate" comments in emails
-
February 05, 2015
05
Feb'15
FCC’s Tom Wheeler offers up net neutrality plan
The Federal Communications Commission (FCC) may rule in favour of a strong regulatory environment to preserve the open internet
-
February 05, 2015
05
Feb'15
Ross Ulbricht faces life for Silk Road dark market conviction
Ross Ulbricht faces life in jail after being convicted of seven charges related to the Silk Road online illegal drugs dark market
-
February 04, 2015
04
Feb'15
IoT could be key to farming, says Beecham Research
The internet of things could be key to the farming industry meeting the challenge of increasing food production by 70% by 2050, says report
-
February 04, 2015
04
Feb'15
Sony says cyber attack will cost $15m
Sony expects the investigation and remediation costs of the November 2014 cyber attack on its movie subsidiary will amount to $15m
-
February 03, 2015
03
Feb'15
EC3 announces industry partnership in fight against cyber crime
Europol's European Cybercrime Centre has partnered with security firm AnubisNetworks to help fight the global threat of cyber crime
-
February 02, 2015
02
Feb'15
Cyber crime is a threat to global economy, says researcher
Halting cyber crime could have a positive impact on the global economy, says Intel Security Europe security researcher and CTO
-
February 02, 2015
02
Feb'15
Darknet technologies have legitimate security uses, says researcher
Darket technologies have legitimate security applications for business, says security investigator
-
February 02, 2015
02
Feb'15
Former Capital One data analysts charged with mining customer data
US financial services regulator SEC charges two former employees of financial services firm Capital One with insider trading
-
January 28, 2015
28
Jan'15
Data Protection Day: Five steps to securing data
Data management firm Iron Mountain has compiled five steps to securing data to mark Data Protection Day