News
IT security
-
October 16, 2014
16
Oct'14
UK is prime target for cyber attacks, says FireEye
The UK has been greatest target of advanced cyber attacks in Europe, the Middle East or Africa in the first half of 2014, report shows
-
October 16, 2014
16
Oct'14
Security key to Bank of Maharashtra payments platform
The Bank of Maharashtra (BOM) is using software from FIS for a card management and card fraud and risk monitoring system as it modernizes its payments platform
-
October 15, 2014
15
Oct'14
Industrial control systems: What are the security challenges?
Targeted attacks on industrial control systems are the biggest threat to critical national infrastructure, says Kaspersky Lab
-
October 15, 2014
15
Oct'14
Cyber security failing in execution, says ex-US cyber czar
Cyber security suffers from a lack of execution, former White House cyber security co-ordinator Howard Schmidt has said.
-
October 15, 2014
15
Oct'14
Gov.uk Verify identity assurance service ready to go live
Government expected to launch first service using digital identity assurance in "next couple of weeks"
-
October 15, 2014
15
Oct'14
CIOs fear poor cloud investment is making businesses uncompetitive
CIOs and CFOs fear their enterprises are missing revenue opportunities due to poor cloud strategies
-
October 13, 2014
13
Oct'14
Embedded SIMs key to unlocking internet of things
GSMA’s eUICC Embedded SIM Specification will help M2M communications and the IoT become mainstream, say analysts
-
October 13, 2014
13
Oct'14
UK ranks third in right to be forgotten requests to Google
The UK has made the third-highest number of requests for links to be removed from Google's search results
-
October 13, 2014
13
Oct'14
Cybercrime fighters to target kingpins, says top EU cyber cop
International cybercrime fighters are to focus on the relatively small number of top malware producers, says Europe's top cyber cop
-
October 10, 2014
10
Oct'14
Azure CTO Mark Russinovich's top ten public cloud security risks
Microsoft Azure cloud CTO Mark Russinovich identified ten key security risks of public cloud services
-
October 10, 2014
10
Oct'14
Symantec splits storage and security
Symantec is splitting its storage and security business, following just days after HP announced its split
-
October 10, 2014
10
Oct'14
Fear and loathing could hold back UK internet of things, says KPMG report
More than two-thirds of UK consumers fear growing number of interconnected devices make it too easy for things to go wrong
-
October 09, 2014
09
Oct'14
WordPress most attacked application
Websites that run the WordPress content management system are attacked 24% more often than those using other systems
-
October 08, 2014
08
Oct'14
Tim Berners-Lee: Data sharing needs accountability
The question of how much data an individual should share was a key theme of Tim Berners-Lee's keynote at IP Expo
-
October 08, 2014
08
Oct'14
Malware being used to steal cash from ATMs
Criminals are using malware to steal cash from ATMs without debit and credit cards
-
October 07, 2014
07
Oct'14
Engineering company rolls out talent management software across 17 countries
Meggitt is deploying cloud-based HR technology as it seeks to integrate 60 diverse business units into a multinational operation
-
October 03, 2014
03
Oct'14
Google could face $100m lawsuit over nude celebrity pictures
Lawyers of celebrities whose private pictures were published by hackers are threatening to sue Google
-
October 01, 2014
01
Oct'14
European firms far from ready for new data rules, study shows
As European authorities aim to ratify revised data protection rules by 2015, many firms have a lot to do to comply
-
October 01, 2014
01
Oct'14
Vtesse bought by Interoute in major fibre expansion
Acquisition adds 7,000km of fibre infrastructure to Interoute’s European network
-
September 30, 2014
30
Sep'14
Cyber Essentials for public sector IT suppliers: pros and cons
What are the pros and cons of the Cyber Essentials Scheme certification mandated for public sector IT suppliers?
-
September 29, 2014
29
Sep'14
Case study: Deutsche Post DHL develops software contract templates to reduce costs
Deutsche Post DHL has created contract templates to manage software costs. Computer Weekly speaks to the people leading the initiative
-
September 25, 2014
25
Sep'14
Bash bug could be bigger threat than Heartbleed
A bug in the Bash command prompt software used by many Unix computers could be a greater threat than Heartbleed.
-
September 24, 2014
24
Sep'14
BlackBerry Passport delivers a real keyboard and high-res screen to business
BlackBerry has introduced its Passport smartphone featuring a 4.5in hi-res screen, a qwerty keyboard and 13MP camera
-
September 23, 2014
23
Sep'14
Google to build giant '40-football pitch' datacentre in the Netherlands
Google will invest €600m to build a giant, 120-megawatt datacentre in the Netherlands
-
September 22, 2014
22
Sep'14
Conficker infections an indictment of IT security, says CWG
Conficker worm infections reflect the “sad state of affairs of IT security”, says the Conficker Working Group
-
September 22, 2014
22
Sep'14
Home Depot under fire for data breach notification
US retailer Home Depot criticised for delays in telling customers their payment card details may have been compromised
-
September 17, 2014
17
Sep'14
KPMG: IoT, 3D printing and healthcare IT to have most impact
Internet of things (IoT), 3D printing and biotech or healthcare IT are among the IT trends that will change the way people work and live
-
September 17, 2014
17
Sep'14
Risk management key to cyber strategy, says BP
Cyber attacks constitute a group-level risk that is managed as part of BP’s standard set of risk management processes, says group chief
-
September 16, 2014
16
Sep'14
GDS unveils 'Gov.UK Verify' public services identity assurance scheme
The Government Digital Service (GDS) debuts a system to prove users’ identities when using public services online, branded as 'Gov.UK Verify'
-
September 15, 2014
15
Sep'14
Salesforce issues advice on avoiding Dyreza attack
Salesforce has issued a set of guidelines on tightening security after a number of its customers were targeted by the Dyreza email virus
-
September 15, 2014
15
Sep'14
WikiLeaks reveals Australian police are using surveillance software
Australia's New South Wales police are using spyware that has been linked to repressive states, according to leaked documents
-
September 11, 2014
11
Sep'14
Google denies breach after hackers leak millions of user logins
Google denies claims cyber criminals stole users' data and downplays the threat after a hacker purportedly leaked 4.9 million Gmail logins
-
September 09, 2014
09
Sep'14
EY seeks tech startups to address challenges of right to be forgotten
Professional services firm Ernst & Young is looking for startups to find technology solutions to the ‘right to be forgotten’ regulation
-
September 08, 2014
08
Sep'14
BP spends £2m developing apps to train business leaders
BP is scrapping online courses in favour of apps and portals that can deliver bite-sized information and training when it's needed
-
September 08, 2014
08
Sep'14
Ransomware on the rise, warns cyber threat report
The first half of 2014 saw an increase in online attacks that lock up user data and hold it for ransom, reports F-Secure Labs
-
September 05, 2014
05
Sep'14
Nude celebrity hack forces changes at Apple and 4Chan
Apple and image-sharing site 4Chan take security measures after celebrity iCloud accounts were compromised and photos leaked
-
September 05, 2014
05
Sep'14
Barclays bank launches biometric authentication
Barclays bank plans to launch biometric readers that read users' finger veins to authenticate customers
-
September 02, 2014
02
Sep'14
Apple and FBI launch iCloud hack investigation
Apple and FBI investigate the breach of Apple’s iCloud causing fresh business concerns over cloud security
-
September 01, 2014
01
Sep'14
Nato set to clarify stance on cyber attack
Leaders will discuss changing the mission of collective defence with respect to cyber attack at this week’s Nato summit
-
September 01, 2014
01
Sep'14
Nude celebrity pictures posted online after alleged iCloud hack
Hundreds of nude images of female celebrities have been leaked, allegedly after Apple’s iCloud service was hacked
-
August 28, 2014
28
Aug'14
Microsoft re-releases security bulletin MS14-045
Microsoft has re-released a software security update that was withdrawn because it put some computers in endless reboot loops
-
August 27, 2014
27
Aug'14
Security experts identify top 10 software design flaws
The IEEE Center for Secure Design has published a report on how to avoid the top 10 software security design flaws
-
August 27, 2014
27
Aug'14
South Korea arrests 16 suspects in massive cyber fraud
South Korea has arrested 16 suspects in connection with a multi-million-dollar fraud enabled by the theft of 27 million online gaming credentials
-
August 26, 2014
26
Aug'14
Local authorities can improve data protection, says ICO audit
There is room for improvement in how local authorities protect personal data, says an audit report by the ICO
-
August 26, 2014
26
Aug'14
DDoS attacks hit Sony’s PlayStation Network and other gaming services
Sony's PlayStation Network and other gaming services reported disruptions at the weekend in a suspected cyber attack campaign
-
August 21, 2014
21
Aug'14
Load balancing supports Kent County Council's VDI project
Kent County Council picks Kemp Technologies load balancers to support a deployment of VMware Horizon View and Workspace across its estate
-
August 21, 2014
21
Aug'14
Heartbleed bug linked to US hospital group hack
A security firm has linked the Community Health Systems data breach to the Heartbleed bug
-
August 14, 2014
14
Aug'14
21% of manufacturers hit by intellectual property theft
More than one in five manufacturing firms reported a loss of intellectual property in a cyber attack in the past year, a study shows
-
August 11, 2014
11
Aug'14
USB-connected devices present cyber vulnerabilities
Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers
-
August 05, 2014
05
Aug'14
Cyber Security Challenge UK takes on the internet of things
The latest level of the Cyber Security Challenge will involve participants hacking devices connected to the internet of things