IT security
-
News
12 Nov 2024
More data stolen in 2023 MOVEit attacks comes to light
Over a year since the infamous MOVEit Transfer cyber attacks affected thousands of organisations, more new victims have come to light after an anonymous threat actor leaked their data on the dark web Continue Reading
By- Alex Scroxton, Security Editor
-
Opinion
12 Nov 2024
Strengthening cyber: Best IAM practices to combat threats
The Security Think Tank considers best practices in identity and access management and how can they be deployed to enable IT departments to combat cyber-attacks, phishing attacks and ransomware Continue Reading
-
Feature
12 Dec 2012
How to preserve forensic evidence in the golden hour after a breach
There is a golden hour at the outset where a clear head and good planning can make or break any subsequent forensic investigation Continue Reading
By- Martin Roots, NIIP
-
News
12 Dec 2012
Ghost Shell hacktivists publish over a million credentials
The Ghost Shell group, an offshoot of the Anonymous hacking collective has published the log-in details from 1.6 million accounts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Dec 2012
UK CIOs see EU regulation as key
A third of UK CIOs are more concerned with EU regulation, such as the data protection directive, than their own local laws, a study has revealed. Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
10 Dec 2012
Audits and compliance requirements for cloud computing
Even as India Inc experiments with the cloud, security concerns play spoilsport. These cloud computing audit and compliance tips will make your journey easier. Continue Reading
By- Narendra Sahoo, Vista Infosec
-
News
07 Dec 2012
UK government jobs website exploited by hackers
Hackers have been able to exploit security flaws in a new government jobs website to steal personal information about job applicants Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
07 Dec 2012
Highlights from PwC’s State of Information Security Survey, India 2013
We bring you excerpts from PwC’s India survey on the state of information security as part of this photofeature. Continue Reading
By- SearchSecurity.in staff
-
Feature
06 Dec 2012
How to secure Macs in the enterprise
Apple computers are becoming increasingly used in the enterprise - we look at how to securely introduce Macs in the corporate network Continue Reading
By- Rob Buckley
-
News
06 Dec 2012
VMworld Europe Case Study: Bull SAS
Bull SAS collaborated with suppliers to build a private cloud platform capable of keeping sensitive data secure. Continue Reading
-
News
06 Dec 2012
2012 Cost of Cyber Crime Study: UK
The 2012 Cost of Cyber Crime Study: United Kingdom is independently conducted by Ponemon Institute. The benchmark study, sponsored by HP Enterprise Security is based on a representative sample of 38 organisations in various industry sectors. Continue Reading
-
News
03 Dec 2012
IT Security Purchasing Intentions 2013
This in-depth research from Computer Weekly and TechTarget reveals the IT security spending priorities of businesses in the UK and Europe. Continue Reading
-
News
27 Nov 2012
Zero-day exploit for Yahoo Mail goes on sale
Hacker sells $700 zero-day exploit for Yahoo Mail that allows attacker to use cross-site scripting vulnerability to steal cookies and hijack accounts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Nov 2012
Security needs to be integral part of life, says McAfee
The world is becoming increasingly connected and security and privacy are integral to modern society, says Raj Samani, CTO of McAfee Europe Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Nov 2012
Deception, proactive defenses can better protect IP, says expert
Deceptive environments, phony data in the enterprise can fool attackers and increase the cost of hacking, says noted cybersecurity expert Paul Kurtz. Continue Reading
By- Robert Westervelt, TechTarget
-
News
19 Nov 2012
Cyber criminals target Skype, Facebook and Windows users
Cyber criminals targeted users of Skype, Facebook and Windows using multiple Blackhole exploits in October, according to security firm GFI Software Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Nov 2012
Nasa to encrypt data after latest breach
Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staff Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Nov 2012
Many UK firms underestimate cost of data breaches, study finds
Many UK organisations are still failing to understand the implications and costs of data breaches, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Nov 2012
Mobile Security Strategies
This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise. Continue Reading
-
News
13 Nov 2012
Secure your data – protect your business
This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data. Continue Reading
-
News
13 Nov 2012
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks. Continue Reading
-
News
12 Nov 2012
Hacking attempts to top one billion in Q4, predicts NCC Group
One billion hacking attempts will be made globally in the final quarter of 2012, according to information assurance firm NCC Group Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Nov 2012
Gartner: BYOD will encourage self-support
Self-support communities will offset the cost and manpower of providing a helpdesk for staff who use their own devices, according to Gartner Continue Reading
By- Cliff Saran, Managing Editor
-
News
09 Nov 2012
Twitter apologises for unnecessary hacking warnings
Twitter has apologised after telling members their accounts had been hacked and forcing them to reset their passwords Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Nov 2012
Stuxnet hit Chevron’s systems, the energy giant admits
US energy giant Chevron has revealed that it was hit by the Stuxnet virus in 2010 Continue Reading
By- Warwick Ashford, Senior analyst
-
Tutorial
07 Nov 2012
Maltego and advanced exploit writing: The PDF tutorial collection
Right from how to write advanced custom exploits to perform reconnaissance using Maltego, you can find it all in this comprehensive PDF tutorial collection. Continue Reading
By- SearchSecurity.in Staff
-
News
07 Nov 2012
Police arrest man for DDoS attacks on Theresa May sites
Police have arrested a 41-year-old man in connection with a cyber attack on websites connected to home secretary Theresa May Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Nov 2012
Apple iOS 6.0.1 update fixes four security holes
iOS platform gets an update to 6.0.1 to fix security and stability problems. WebKit holes and kernel faults list among Apple’s list of patched bugs. Continue Reading
By- SearchSecurity.in Staff
-
Tip
01 Nov 2012
Using ESAPI to fix XSS in your Java code
Customized validation routines are the norm in Indian organizations for fixing vulnerabilities. OWASP’s ESAPI framework may prove to be a better option. Continue Reading
By- Celia Rexselin Aloysius, Contributor
-
News
01 Nov 2012
Parliamentary committee joins criticism of draft communications data bill
Home secretary Theresa May faced stern criticism before a Parliamentary committee hearing evidence on the Draft Communications Data Bill Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Oct 2012
‘VM-aware’ viruses on the rise
Viruses targeting virtual machines (VM) are growing in numbers and will soon be the dominant force in the world of cyber crime, says Kaspersky Continue Reading
By- Jennifer Scott, TechTarget
-
News
31 Oct 2012
Apple squashes BlackBerry as Brent Borough deploys iPads
Brent Borough Council replaces BlackBerry and deploys MobileIron to securely manage almost 3,000 iPads and iPhones Continue Reading
-
Tip
31 Oct 2012
Identity and access management (IAM) in the cloud: Challenges galore
Identity and access management (IAM) in the cloud poses never before seen challenges to Indian organizations. Here are some points to keep an eye out for. Continue Reading
By- Narendra Sahoo, Vista Infosec
-
News
31 Oct 2012
Free mobile apps a threat to privacy, study finds
Free mobile apps pose a serious threat to privacy because of their ability to capture large amounts of user information Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Oct 2012
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Oct 2012
Government expected to unveil eight IDA suppliers for online services
The government is to announce suppliers – including PayPal, BT and the Post Office – to provide identity assurance (IDA) for online public services Continue Reading
By- Kathleen Hall, TechTarget
-
News
25 Oct 2012
ICO hits Stoke-on-Trent City Council with £120,000 fine
Stoke City Council has breached the Data Protection Act, for the second time in two years, after details of a child protection legal case were emailed to the wrong person. Continue Reading
By- Jennifer Scott, TechTarget
-
News
24 Oct 2012
CIO interview: Gerry Pennell, CIO, London 2012 Olympic Games
As the job of a lifetime nears its end, London 2012 CIO Gerry Pennell talks exclusively to Computer Weekly about his Olympic experience Continue Reading
-
News
22 Oct 2012
Cyber attacks launched at London 2012 Olympic Games every day
The IT supporting the London 2012 Olympics was hit by cyber attacks every day during the Games, says London 2012 CIO Gerry Pennell Continue Reading
By- Bryan Glick, Editor in chief
-
Opinion
18 Oct 2012
Security Think Tank: You can’t protect what you don’t know you’ve got
IP theft: who should be tackling it and how? Continue Reading
By- Adrian Wright
-
Tip
18 Oct 2012
Leading Indian banking portals contain glaring security lapses
Even as Internet banking portals transform the way Indians bank, vulnerabilities exist in banking websites like SBI, Citibank India, HDFC Bank and ICICI Bank. Continue Reading
By- Ajit Hatti, Contributor
-
News
18 Oct 2012
Google offers Street View of datacentres
Google offers Street View of its datacentres and a virtual tour of how users' data is stored, with an emphasis on security practices Continue Reading
-
News
17 Oct 2012
ZTE targets local government for UK growth
Despite security controversy, Chinese firm ZTE’s UK head of sales tells Computer Weekly one of its first targets will be local government Continue Reading
By- Jennifer Scott, TechTarget
-
News
17 Oct 2012
McKinnon's mum gives tearful thanks after government halts US extradition
The mother of Gary McKinnon thanks those who helped their 10-year campaign against a US extradition order for hacking federal computers Continue Reading
By -
News
16 Oct 2012
Theresa May: Hacker Gary McKinnon to stay in UK
Hacker Gary McKinnon will stay in UK, home secretary Theresa May has told MPs Continue Reading
By- Cliff Saran, Managing Editor
-
News
16 Oct 2012
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Oct 2012
Home secretary Theresa May rules on hacker Gary McKinnon’s US extradition
Home secretary Theresa May is to rule on self-confessed computer hacker Gary McKinnon's extradition to the US Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Oct 2012
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Oct 2012
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Oct 2012
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm Qualys Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Oct 2012
DWP to announce identity assurance suppliers
The Department for Work and Pensions (DWP) is to announce the first providers in the government’s identity assurance (IDA) scheme at the end of October Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
10 Oct 2012
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Continue Reading
By- Bill Goodwin, Computer Weekly
-
Tip
09 Oct 2012
Vulnerabilities in JavaScript: Secure coding insights and tips
JavaScript vulnerabilities are on the rise in India with the entry of HTML5 and faster JavaScript engines. Here are some key problem areas along with antidotes. Continue Reading
By- Lavakumar Kuppan, Contributor
-
News
05 Oct 2012
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterprise Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
Photo Story
03 Oct 2012
Five DDoS attack tools that you should know about
In this photo-story we explore common distributed denial-of-service (DDoS) attack tools and their features. Also learn how to guard against DDoS attacks. Continue Reading
By- Karthik Poojary, Amazon
-
News
02 Oct 2012
HMRC deploys Becrypt off-the-shelf encryption
HMRC will use Becrypt Disk protect, which has recently been certified under the government’s Commercial Product Assurance (CPA) Scheme. Continue Reading
By- Cliff Saran, Managing Editor
-
News
02 Oct 2012
Hackers target White House military network
Hackers using computers in China have infiltrated an “unclassified” network in the US White House, believed to be used for issuing nuclear commands. Continue Reading
By- Cliff Saran, Managing Editor
-
News
01 Oct 2012
Data Protection Masterclass: New EU Data Protection Regulation
Law firm, Morrison & Foerster, examines the impact of new EU Data Protection legislation on buinsesses. Continue Reading
-
Photo Story
29 Sep 2012
nullcon Delhi 2012: Day 2's action
SearchSecurity.IN brings you the live coverage of the fourth edition of Indian infosec community Null’s conference. Continue Reading
By- Varun Haran, Reporter
-
News
27 Sep 2012
EC sets out strategy for EU cloud data and standards
The European Commission (EC) has unveiled a strategy for standards and a legal framework for cloud computing in European Union (EU) states Continue Reading
By- Cliff Saran, Managing Editor
-
News
27 Sep 2012
Izz ad-Din al-Qassam hackers launch cyber attack on US bank Wells Fargo
A hacker group connected to Hamas says it attacked US bank Wells Fargo in reaction to the video 'Innocence of Muslims' posted on YouTube Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Sep 2012
BYOD: IT must tackle printer security
With more staff bringing their own devices to work, IT needs to rethink its printing and scanning policies Continue Reading
By- Cliff Saran, Managing Editor
-
Tip
25 Sep 2012
Limitations of two factor authentication (2FA) technology
The common two factor authentication (2FA) techniques used In India have several shortfalls. We take a look at security risks associated with 2FA solutions. Continue Reading
By- Rakesh Thatha, Contributor
-
News
25 Sep 2012
Security concerns hold back mobile banking adoption
More than two-thirds of smartphone owners have not yet adopted mobile banking apps because of security concerns, a survey has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Sep 2012
UK faces BlackBerry outage again
People in the UK, Middle East and Europe are again facing disruption to the BlackBerry email messaging service Continue Reading
By- Cliff Saran, Managing Editor
-
News
20 Sep 2012
Dell SecureWorks uncovers cyber espionage targeting energy firms
Dell SecureWorks researchers have discovered a cyber espionage campaign targeting several companies, including two in the energy sector Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
20 Sep 2012
Smashing smartphones
How strong are modern smartphones. Data recovery specialist Kroll Ontrack set out to destroy them Continue Reading
By- Cliff Saran, Managing Editor
-
News
18 Sep 2012
Microsoft investigates IE zero-day flaw
Microsoft says it is investigating reports of a vulnerability in Internet Explorer 6, 7, 8, and 9 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Sep 2012
CW Buyer's Guide: Data Security
This in-depth buyer's guide offers advice to CISOs on keeping up with security best practice as new EU data protection rules come into force Continue Reading
-
News
17 Sep 2012
Android devices vulnerable to security breaches
More than 50% of devices running Google's Android OS have unpatched vulnerabilities, opening them up to malicious apps and other attacks Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
17 Sep 2012
IT security awareness needs to be company-wide, says (ISC)²
Information security awareness needs to be more robust, started as early as possible, continually reinforced and organisation-wide, says Julie Peeler, director, (ISC)² Foundation Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
17 Sep 2012
Static code analysis tools gain traction in India as SDL models mature
Static analysis tools are gaining popularity with Indian companies as software development models and perspectives mature. Here are some popular choices. Continue Reading
By- Varun Haran, Reporter
-
News
14 Sep 2012
Microsoft disrupts Nitol botnet, outs hidden PC malware
The Nitol botnet controlled more than 500 strains of embedded malware that Microsoft says has been plaguing the PC supply chain. Continue Reading
By- Robert Westervelt, TechTarget
-
News
13 Sep 2012
Government launches £3.8m cyber security institute
The government has ramped up moves to tackle growing cyber security threats by launching a £3.8m research institute. Continue Reading
By- Kathleen Hall, TechTarget
-
News
11 Sep 2012
Skills shortage means no unemployment in IT security, says (ISC)2
Zero unemployment in IT security shows a huge shortage of skills in the profession, says Hord Tipton, executive director of (ISC)2 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Sep 2012
Gartner: Prepare for context-aware security
Cloud computing, IT consumerisation and the evolving threat landscape are forcing IT departments to rethink security Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
10 Sep 2012
HDFC Bank’s ISO 27004-compliant security metrics a boost toward GRC
An ISO/IEC 27004-compliant metrics program is a rarity in the Indian infosec circuit. Indian BFSI major HDFC Bank’s ISMS has been there, done that Continue Reading
By- Varun Haran, Reporter
-
Photo Story
09 Sep 2012
DEF-CON Bangalore (DC9180) Meet Live
Get a front row view of the action-packed goings on at DEFCON Bangalore 2012 in this Live photo feature. Continue Reading
By- SearchSecurity.in Staff
-
News
07 Sep 2012
UK cookie law compliance mixed, study finds
Three months after the enforcement of the cookie law, only 12% of UK websites have prominent privacy notices and robust cookie controls, a study shows Continue Reading
-
Feature
05 Sep 2012
Setting up a botnet is easier than you think
Acquiring, installing, configuring and using a powerful data-stealing banking Trojan toolkit is not as difficult as it sounds Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Sep 2012
FBI denies link to leaked Apple device codes
The FBI says there is no evidence that Anonymous gained access to 12 million identity codes for Apple devices by hacking an FBI agent's laptop Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Sep 2012
Anonymous claims a million Apple IDs in FBI breach
Hacking group Anonymous claims to have released over a million Apple Unique Device Identifiers (UDIDs) obtained from breaching FBI networks Continue Reading
-
News
03 Sep 2012
Personal mobile policies lacking in IT
Just 23% of IT departments in the UK have a strategy for managing the use of personal devices on their corporate networks, according to new research Continue Reading
By- Jennifer Scott, TechTarget
-
News
03 Sep 2012
Powerful cyber attack tools widely available, say researchers
More low-level cyber criminals are getting access to sophisticated attack tools, say cyber intelligence specialists Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Sep 2012
Advanced cyber-security intelligence
Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools. Continue Reading
-
News
03 Sep 2012
Cyber Vulnerability Index
What does your online corporate profile reveal? With so many cyber attacks in the news recently, executives are becoming increasingly concerned about their organisation’s exposure to hackers. Continue Reading
-
Opinion
31 Aug 2012
How to survive a data breach
Six practical tips on how to prepare for and survive a data breach Continue Reading
By- Conrad Constantine
-
Photo Story
31 Aug 2012
Adopting BYOD culture sans chaos: An Indian perspective
The bring your own device (BYOD) concept is changing security and cost paradigms. We look at BYOD considerations for Indian businesses in this series. Continue Reading
By- SearchSecurity.in Staff
-
News
31 Aug 2012
Businesses worldwide fail to prepare for cyber threats, says Kaspersky Lab
Companies around the world have failed to address cyber threats, according to a survey from security organisation Kaspersky Lab Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Aug 2012
Amazon Appstore opens Android to attack
Amazon is urging users to switch off a safety feature in Android which prevents rogue apps from being downloaded, to install its Appstore software Continue Reading
By- Cliff Saran, Managing Editor
-
News
24 Aug 2012
VMware users can protect against virtual machine malware, says Trend Micro
New malware that attacks VMware virtual machines is no cause for undue concern, but users can take basic steps to protect data, says Trend Micro Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Aug 2012
SCC becomes first supplier to win G-Cloud security accreditation
IT infrastructure company SCC has become the first supplier on the government’s CloudStore to win pan-government security accreditation. Continue Reading
By- Kathleen Hall, TechTarget
-
News
21 Aug 2012
At least 9 out of 10 top mobile apps hacked, study shows
An average of 96% of the top 100 paid mobile apps have been hacked, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Aug 2012
More than 1,000 school application details leaked on the internet
Personal information about more than 1,000 children has been published on the UK Independent Schools Guide website after an alleged cyber attack Continue Reading
-
News
17 Aug 2012
Cyber security boot camp to educate potential cyber spooks
A group of about 30 young people will attend a cyber security boot camp announced by the organisations responsible for the Cyber Security Challenge next month. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Tip
14 Aug 2012
Mobile application security issues and threat vectors in enterprises
As mobile application security threats take on serious proportions, we explore the issues and risks involved for users and enterprises. Continue Reading
By- Ram Venkatraman
-
News
08 Aug 2012
Good data protection can be cheap and easy, says ICO
The ICO says charities and third sector organisations stand to benefit most from a data protection check-up. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Aug 2012
LinkedIn data breach costs more than $1m
LinkedIn says the forensic investigation and other recovery costs of the data breach in June could have topped $1m. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Aug 2012
RBS computer problem costs £125m
Royal Bank of Scotland will pay £125m in costs related to computer problems in June that meant customers could not access funds Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
01 Aug 2012
Compliance and risk
Compliance and risk managers have to overcome many challenges as a result of the data protection framework. This exclusive resource discusses some of the difficulties the European Union has to face because of regulations. Continue Reading
-
News
31 Jul 2012
Cyber threats affect banks worldwide
Nearly a quarter of the world's banks were hit by security breaches in the past year, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
27 Jul 2012
Cybergeddon: Pictures from the digital crime thriller
CSI creator Anthony E. Zuiker, brings to life the growing threat of cybercrime Continue Reading
By- Caroline Baldwin, Freelance editor and journalist