News
Privacy and data protection
-
August 19, 2016
19
Aug'16
Police arrest woman in connection with Sage data breach
A woman has been arrested on suspicion of fraud in connection with a data breach at accounting software firm Sage
-
August 16, 2016
16
Aug'16
Cerber ransomware service reaps $195,000 profit in a month
Franchises such as Cerber are making highly profitable ransomware available to a broader range of cyber criminals, according to a report by security firm Check Point
-
August 15, 2016
15
Aug'16
Financial sector faces era of cyber mega heists
Banks and other financial institutions are threatened by a new breed of elite cyber criminals running professional operations that will use any means to achieve their goals, says Barclays security chief
-
August 15, 2016
15
Aug'16
Sage data breach underlines insider threat
Organisations need to take insider threats more seriously say security experts, as Sage warns that a data breach using an internal log-in may have compromised employee data at nearly 300 UK firms
-
August 10, 2016
10
Aug'16
MI5 staff repeatedly overrode data surveillance rules
Security service MI5 is responsible for 210 “clear contraventions” over five years for the way it accessed private internet and telephone data
-
August 08, 2016
08
Aug'16
Strider cyber attack group deploying malware for espionage
Symantec security researchers have uncovered a spying campaign by a previously unknown group using modular malware as stealthware
-
August 05, 2016
05
Aug'16
Banner Health cyber breach underlines need for faster intrusion detection
A data breach at Banner Health has highlighted the importance of intrusion detection and prompted calls for greater cyber security investment in the increasingly targeted healthcare industry
-
August 05, 2016
05
Aug'16
Artificial intelligence takes centre stage in cyber security
Artificial intelligence-led cyber security technology has been in the spotlight at two major industry conferences in Las Vegas, signalling a firm trend in cyber defence research
-
August 04, 2016
04
Aug'16
Italian-based Android RAT spies on mobiles in Japan and China, say researchers
Researchers discover an Italian-based Android RAT designed for spying that is targeting mobile devices using their unique identification codes
-
July 28, 2016
28
Jul'16
UK’s top security judges struggle to assess privacy threats
Technological advancements make it difficult for the Investigatory Powers Tribunal to assess privacy threats, say the tribunal’s own judges
-
July 26, 2016
26
Jul'16
Date set for landmark hearing into EU-US data transfers
Irish court hearing triggered by Austrian law student Max Schrems could have huge implications for EU-US trade and the data privacy rights of millions of EU citizens
-
July 21, 2016
21
Jul'16
Security industry welcomes cyber crime’s inclusion in official stats
The security industry welcomes the inclusion of cyber crime statistic in official crime reports to highlight the size and nature of the threat
-
July 21, 2016
21
Jul'16
Mobile payments get Isaca’s security approval
Mobile contactless payments enable three key security controls that make them more secure than physical and e-commerce payments, according to a report by Isaca
-
July 19, 2016
19
Jul'16
Carbon Black bets on next-generation antivirus
Carbon Black is betting on next-generation antivirus technology by acquiring Confer to extend the capability and appeal of its endpoint protection offerings
-
July 19, 2016
19
Jul'16
Case study: Rémy Cointreau boosts security and productivity
Drinks firm Rémy Cointreau uses Centrify’s identity and mobile management to simplify security, improve business agility and reduce IT costs
-
July 14, 2016
14
Jul'16
Cyber attacks cost UK business more than £34bn a year, study shows
Nearly half of UK firms lack advanced cyber defences, despite the high level of concern about cyber attacks and associated costs
-
July 12, 2016
12
Jul'16
IBM sets up security centre in Canberra
IBM leads the charge as large private businesses invest heavily in security resources across Australia in an attempt to close the security gap
-
July 11, 2016
11
Jul'16
Datadog calls for password reset after cyber breach
Monitoring and analytics firm detected unauthorised activity associated with production servers and database of user credentials
-
July 06, 2016
06
Jul'16
UK's Darktrace aims to lead the way to automatic cyber security
Darktrace hopes to be a leader in the move to automated cyber security to free up security professionals to focus on business risk and innovation
-
June 29, 2016
29
Jun'16
Lauri Love using illness as a shield against extradition, claims prosecution
Prosecution lawyer questions whether activist Lauri Love is not fit enough to stand trial in the US over hacking charges,as expert witnesses warn that US prisons are ill-equipped for people with mental health problems.
-
June 29, 2016
29
Jun'16
Most cyber security strategies ignore the way attackers really work
Cyber attackers use more legitimate software than malware, which means most organisations are incapable of detecting much of the malicious activity in their networks, a report reveals
-
June 29, 2016
29
Jun'16
Lauri Love may be faking mental illness claims lawyer for US
Prosecution lawyer Peter Caldwell questions whether activist Lauri Love is exaggerating mental health problems to avoid extradition to face hacking charges in the US
-
June 28, 2016
28
Jun'16
Lauri Love suicide risk if extradited to US over hacking allegations
Westminster Magistrates’ Court hears evidence from medical experts that alleged hacker Lauri Love is at risk of suicide if extradited to the US
-
June 21, 2016
21
Jun'16
Enterprises urged not to view security as a barrier to internet of things adoption
The Lower Colorado River Authority’s chief administrative officer urges enterprises to balance the risks of using the internet of things with the benefits connected devices can bring
-
June 21, 2016
21
Jun'16
Cyber security industry mostly welcomes report on TalkTalk breach
Most of the recommendations of a government committee inquiry into the TalkTalk breach have been welcomed, but pundits have expressed reservations about some, particularly proposed new fines
-
June 17, 2016
17
Jun'16
How MI5 and MI6 gather your personal data for surveillance
Publicly released documents shed light on the many databases and sources used by the intelligence services to gather bulk personal data about UK citizens
-
June 14, 2016
14
Jun'16
Shadow data and the risks posed by cloud storage and apps
Cloud storage and apps can open up an organisation to risks of data leakage. Computer Weekly looks at key areas of vulnerability and what you can do to prevent your data going viral
-
June 13, 2016
13
Jun'16
EU firms slow in detecting cyber attacks, study shows
European firms take an average of 469 days to discover a compromise, compared with an average of 146 days globally, according to Mandiant
-
June 12, 2016
12
Jun'16
Philippines government data breach is a warning to Asean region
Security is a rising concern in the Asean region, with fears fuelled by incidents such as the recent hacking incident in Manila
-
June 10, 2016
10
Jun'16
IoT security: Lack of expertise will hurt, says Bruce Schneier
Government action at national and international levels is essential for addressing IoT security issues, but the relevant expertise is lacking, according to security expert Bruce Schneier
-
June 10, 2016
10
Jun'16
Small businesses bearing the brunt of cyber crime, says FSB
The Federation of Small Businesses is calling for more government support for its members in defending against cyber threats
-
June 07, 2016
07
Jun'16
Millions of sensitive IT services exposed to the internet, study finds
Encryption should become the default as study reveals millions of sensitive services are exposed to the internet, says Rapid7
-
June 06, 2016
06
Jun'16
How emails sent to and from Parliament are monitored
Government officials deny that emails sent by MPs are open to surveillance by GCHQ and NSA - we examine the evidence
-
June 01, 2016
01
Jun'16
MPs’ private emails are routinely accessed by GCHQ
Computer Weekly investigation reveals the extent of interception of MPs’ and peers’ email communications and data
-
May 26, 2016
26
May'16
UK government details plans for National Cyber Security Centre
The objectives of the UK’s National Cyber Security Centre are to address systemic vulnerabilities, reduce risks, respond to serious incidents and nurture national cyber security capability
-
May 24, 2016
24
May'16
Network Collapse: Why the internet is flirting with disaster
It’s surprising the internet works at all, given the age of its core software. The question is, can we catch it before it falls over?
-
May 19, 2016
19
May'16
Lessons from LinkedIn data breach revelations
There are several important lessons to be learned from revelations about LinkedIn's 2012 data breach, say security experts
-
May 18, 2016
18
May'16
Cyber espionage campaign targets Ukraine separatists
Security researchers discover a surveillance operation against separatists in Eastern Ukraine using spear phishing attacks to spread previously unknown malware
-
May 17, 2016
17
May'16
Police set for better engagement with UK tech firms
The policing lead for digital investigation and intelligence says new structures will improve engagement and collaboration between the UK tech industry and police forces
-
May 13, 2016
13
May'16
Time to shift information security focus away from prevention, says Swiss bank CISO
Organisations need a new approach which recognises security is “breakable”, according to Michael Meli
-
May 13, 2016
13
May'16
10 key facts businesses need to note about the GDPR
With less than two years before the new EU data protection rules come into force, there are key areas businesses need to focus on to ensure they will be compliant
-
May 13, 2016
13
May'16
Swift reports another Bangladesh central bank-style cyber attack
Global financial messaging organisation Swift warns of a highly adaptive cyber criminal campaign targeting banks with user credentials to submit transfer requests
-
May 12, 2016
12
May'16
IAM central to Deutsche Bank’s digital transformation
Deutsche Bank is using a centralised identity and access management (IAM) system and an application program interface (API) architecture for digital transformation
-
May 10, 2016
10
May'16
UK court rejects demands for Lauri Love to hand over encryption keys
Court rules against an attempt by the National Crime Agency to force activist Lauri Love to disclose encryption keys by bypassing the Regulation of Investigatory Powers Act
-
May 09, 2016
09
May'16
Australian health sector an easy target for cyber criminals, says IBM
A push to encourage greater adoption of electronic health records has raised the spectre of online record theft
-
May 06, 2016
06
May'16
Ransomware emerges as a top cyber threat to business
Security researchers at Kasperky Lab and FireEye confirm that the upward trend of ransomware is continuing and has emerged as a top threat to business
-
May 04, 2016
04
May'16
D-Day for GDPR is 25 May 2018
The European Parliament’s official publication of the General Data Protection Regulation means it will become enforceable on 25 May 2018
-
April 28, 2016
28
Apr'16
Payment card industry issues data security standard update
PCI DSS version 3.2 introduces six new requirements for compliance, some additional guidance and a raft of clarifications
-
April 28, 2016
28
Apr'16
Technology moving too fast for governments to keep up, says former Darpa chief
Former US defence technology chief supports encryption and privacy, despite intelligence services’ fears
-
April 27, 2016
27
Apr'16
IPv6 alone will not secure IoT, warns GE CISO
It is important for all users of the internet of things to understand what they are getting into with IPv6, and to be aware of the risks and myths, says GE CISO Hanns Proenen