IT security
-
E-Zine
07 Dec 2023
CW EMEA: Prepare for cyber war
When the war between Hamas and Israel began in October, cyber security professionals and major government and private organisations braced for an inevitable accompanying online war. In this issue of CW EMEA, we outline cyber war, patterns of threat activity, and find out what security teams can do to protect their organisations. We also look at Finland’s advances in quantum computing, how Belgian researchers have developed technology to help datacentres process data faster, and the secrets of KPN’s successful business transformation. Read the issue now. Continue Reading
-
E-Zine
09 Nov 2023
Heineken lets the data flow
In this month’s CW EMEA ezine, we find out about Heineken’s mission to make the most out of the data it holds through an enterprise-wide data ecosystem. We also look at how the UK has turned its back on the German government-funded Gaia-X data platform, why cyber experts are urging the EU to rethink vulnerability disclosure plans, and how the IT industry is responding to the software developer skills shortfall. Read the issue now. Continue Reading
-
News
13 Nov 2012
Mobile Security Strategies
This exclusive report for Computer Weekly members explains the security risks and challenges of using mobile devices in the enterprise. Continue Reading
-
News
13 Nov 2012
Secure your data – protect your business
This guide for C-level executives explains the risks faced by businesses and the practical solutions they can take to secure their data. Continue Reading
-
News
13 Nov 2012
The Global State of Information Security Survey 2013: Key Findings
This global study examines the state of cyber-security and the impact of cyber crime and offers advice to businesses on reducing the risks. Continue Reading
-
News
12 Nov 2012
Hacking attempts to top one billion in Q4, predicts NCC Group
One billion hacking attempts will be made globally in the final quarter of 2012, according to information assurance firm NCC Group Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Nov 2012
Gartner: BYOD will encourage self-support
Self-support communities will offset the cost and manpower of providing a helpdesk for staff who use their own devices, according to Gartner Continue Reading
By- Cliff Saran, Managing Editor
-
News
09 Nov 2012
Twitter apologises for unnecessary hacking warnings
Twitter has apologised after telling members their accounts had been hacked and forcing them to reset their passwords Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Nov 2012
Stuxnet hit Chevron’s systems, the energy giant admits
US energy giant Chevron has revealed that it was hit by the Stuxnet virus in 2010 Continue Reading
By- Warwick Ashford, Senior analyst
-
Tutorial
07 Nov 2012
Maltego and advanced exploit writing: The PDF tutorial collection
Right from how to write advanced custom exploits to perform reconnaissance using Maltego, you can find it all in this comprehensive PDF tutorial collection. Continue Reading
By- SearchSecurity.in Staff
-
News
07 Nov 2012
Police arrest man for DDoS attacks on Theresa May sites
Police have arrested a 41-year-old man in connection with a cyber attack on websites connected to home secretary Theresa May Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Nov 2012
Apple iOS 6.0.1 update fixes four security holes
iOS platform gets an update to 6.0.1 to fix security and stability problems. WebKit holes and kernel faults list among Apple’s list of patched bugs. Continue Reading
By- SearchSecurity.in Staff
-
Tip
01 Nov 2012
Using ESAPI to fix XSS in your Java code
Customized validation routines are the norm in Indian organizations for fixing vulnerabilities. OWASP’s ESAPI framework may prove to be a better option. Continue Reading
By- Celia Rexselin Aloysius, Contributor
-
News
01 Nov 2012
Parliamentary committee joins criticism of draft communications data bill
Home secretary Theresa May faced stern criticism before a Parliamentary committee hearing evidence on the Draft Communications Data Bill Continue Reading
By- Warwick Ashford, Senior analyst
-
News
31 Oct 2012
‘VM-aware’ viruses on the rise
Viruses targeting virtual machines (VM) are growing in numbers and will soon be the dominant force in the world of cyber crime, says Kaspersky Continue Reading
By- Jennifer Scott, TechTarget
-
News
31 Oct 2012
Apple squashes BlackBerry as Brent Borough deploys iPads
Brent Borough Council replaces BlackBerry and deploys MobileIron to securely manage almost 3,000 iPads and iPhones Continue Reading
-
Tip
31 Oct 2012
Identity and access management (IAM) in the cloud: Challenges galore
Identity and access management (IAM) in the cloud poses never before seen challenges to Indian organizations. Here are some points to keep an eye out for. Continue Reading
By- Narendra Sahoo, Vista Infosec
-
News
31 Oct 2012
Free mobile apps a threat to privacy, study finds
Free mobile apps pose a serious threat to privacy because of their ability to capture large amounts of user information Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Oct 2012
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Oct 2012
Government expected to unveil eight IDA suppliers for online services
The government is to announce suppliers – including PayPal, BT and the Post Office – to provide identity assurance (IDA) for online public services Continue Reading
By- Kathleen Hall, TechTarget
-
News
25 Oct 2012
ICO hits Stoke-on-Trent City Council with £120,000 fine
Stoke City Council has breached the Data Protection Act, for the second time in two years, after details of a child protection legal case were emailed to the wrong person. Continue Reading
By- Jennifer Scott, TechTarget
-
News
24 Oct 2012
CIO interview: Gerry Pennell, CIO, London 2012 Olympic Games
As the job of a lifetime nears its end, London 2012 CIO Gerry Pennell talks exclusively to Computer Weekly about his Olympic experience Continue Reading
-
News
22 Oct 2012
Cyber attacks launched at London 2012 Olympic Games every day
The IT supporting the London 2012 Olympics was hit by cyber attacks every day during the Games, says London 2012 CIO Gerry Pennell Continue Reading
By- Bryan Glick, Editor in chief
-
Opinion
18 Oct 2012
Security Think Tank: You can’t protect what you don’t know you’ve got
IP theft: who should be tackling it and how? Continue Reading
By- Adrian Wright
-
Tip
18 Oct 2012
Leading Indian banking portals contain glaring security lapses
Even as Internet banking portals transform the way Indians bank, vulnerabilities exist in banking websites like SBI, Citibank India, HDFC Bank and ICICI Bank. Continue Reading
By- Ajit Hatti, Contributor
-
News
18 Oct 2012
Google offers Street View of datacentres
Google offers Street View of its datacentres and a virtual tour of how users' data is stored, with an emphasis on security practices Continue Reading
-
News
17 Oct 2012
ZTE targets local government for UK growth
Despite security controversy, Chinese firm ZTE’s UK head of sales tells Computer Weekly one of its first targets will be local government Continue Reading
By- Jennifer Scott, TechTarget
-
News
17 Oct 2012
McKinnon's mum gives tearful thanks after government halts US extradition
The mother of Gary McKinnon thanks those who helped their 10-year campaign against a US extradition order for hacking federal computers Continue Reading
By -
News
16 Oct 2012
Theresa May: Hacker Gary McKinnon to stay in UK
Hacker Gary McKinnon will stay in UK, home secretary Theresa May has told MPs Continue Reading
By- Cliff Saran, Managing Editor
-
News
16 Oct 2012
Organisations need alternative data protection as security models fail
Organisations' security models are failing - so could it be time to adopt an intelligence-led approach to data protection and fighting cyber crime? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Oct 2012
Home secretary Theresa May rules on hacker Gary McKinnon’s US extradition
Home secretary Theresa May is to rule on self-confessed computer hacker Gary McKinnon's extradition to the US Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Oct 2012
RSA Europe: Thousands of unprotected virtual servers exposed to the web
Organisations are failing to protect data in virtual environments, says Jason Hart, vice-president cloud solutions, SafeNet Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Oct 2012
RSA Europe: Security concerns whole supply chain, says Misha Glenny
Targeted attacks affect the whole supply chain, not just big corporations, author Misha Glenny tells RSA Conference Europe 2012 attendees Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Oct 2012
RSA Europe: Cloud key to future information security, says Qualys
Cloud computing is an opportunity information security professionals should not miss, says Philippe Courtot, CEO of security firm Qualys Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Oct 2012
DWP to announce identity assurance suppliers
The Department for Work and Pensions (DWP) is to announce the first providers in the government’s identity assurance (IDA) scheme at the end of October Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
10 Oct 2012
CW500: Managing the mobile workforce (part 1)
Mobile working has transformed Colt Telecommunications beyond recognition over the past three years Continue Reading
By- Bill Goodwin, Computer Weekly
-
Tip
09 Oct 2012
Vulnerabilities in JavaScript: Secure coding insights and tips
JavaScript vulnerabilities are on the rise in India with the entry of HTML5 and faster JavaScript engines. Here are some key problem areas along with antidotes. Continue Reading
By- Lavakumar Kuppan, Contributor
-
News
05 Oct 2012
Security firm warns against Samsung Galaxy Tab for enterprise use
Security specialist Context Information Security says vulnerabilities in the Samsung Galaxy Tab make it unsuitable for use in the enterprise Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
Photo Story
03 Oct 2012
Five DDoS attack tools that you should know about
In this photo-story we explore common distributed denial-of-service (DDoS) attack tools and their features. Also learn how to guard against DDoS attacks. Continue Reading
By- Karthik Poojary, Amazon
-
News
02 Oct 2012
HMRC deploys Becrypt off-the-shelf encryption
HMRC will use Becrypt Disk protect, which has recently been certified under the government’s Commercial Product Assurance (CPA) Scheme. Continue Reading
By- Cliff Saran, Managing Editor
-
News
02 Oct 2012
Hackers target White House military network
Hackers using computers in China have infiltrated an “unclassified” network in the US White House, believed to be used for issuing nuclear commands. Continue Reading
By- Cliff Saran, Managing Editor
-
News
01 Oct 2012
Data Protection Masterclass: New EU Data Protection Regulation
Law firm, Morrison & Foerster, examines the impact of new EU Data Protection legislation on buinsesses. Continue Reading
-
Photo Story
29 Sep 2012
nullcon Delhi 2012: Day 2's action
SearchSecurity.IN brings you the live coverage of the fourth edition of Indian infosec community Null’s conference. Continue Reading
By- Varun Haran, Reporter
-
News
27 Sep 2012
EC sets out strategy for EU cloud data and standards
The European Commission (EC) has unveiled a strategy for standards and a legal framework for cloud computing in European Union (EU) states Continue Reading
By- Cliff Saran, Managing Editor
-
News
27 Sep 2012
Izz ad-Din al-Qassam hackers launch cyber attack on US bank Wells Fargo
A hacker group connected to Hamas says it attacked US bank Wells Fargo in reaction to the video 'Innocence of Muslims' posted on YouTube Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Sep 2012
BYOD: IT must tackle printer security
With more staff bringing their own devices to work, IT needs to rethink its printing and scanning policies Continue Reading
By- Cliff Saran, Managing Editor
-
Tip
25 Sep 2012
Limitations of two factor authentication (2FA) technology
The common two factor authentication (2FA) techniques used In India have several shortfalls. We take a look at security risks associated with 2FA solutions. Continue Reading
By- Rakesh Thatha, Contributor
-
News
25 Sep 2012
Security concerns hold back mobile banking adoption
More than two-thirds of smartphone owners have not yet adopted mobile banking apps because of security concerns, a survey has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Sep 2012
UK faces BlackBerry outage again
People in the UK, Middle East and Europe are again facing disruption to the BlackBerry email messaging service Continue Reading
By- Cliff Saran, Managing Editor
-
News
20 Sep 2012
Dell SecureWorks uncovers cyber espionage targeting energy firms
Dell SecureWorks researchers have discovered a cyber espionage campaign targeting several companies, including two in the energy sector Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
20 Sep 2012
Smashing smartphones
How strong are modern smartphones. Data recovery specialist Kroll Ontrack set out to destroy them Continue Reading
By- Cliff Saran, Managing Editor
-
News
18 Sep 2012
Microsoft investigates IE zero-day flaw
Microsoft says it is investigating reports of a vulnerability in Internet Explorer 6, 7, 8, and 9 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Sep 2012
CW Buyer's Guide: Data Security
This in-depth buyer's guide offers advice to CISOs on keeping up with security best practice as new EU data protection rules come into force Continue Reading
-
News
17 Sep 2012
Android devices vulnerable to security breaches
More than 50% of devices running Google's Android OS have unpatched vulnerabilities, opening them up to malicious apps and other attacks Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
17 Sep 2012
IT security awareness needs to be company-wide, says (ISC)²
Information security awareness needs to be more robust, started as early as possible, continually reinforced and organisation-wide, says Julie Peeler, director, (ISC)² Foundation Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
17 Sep 2012
Static code analysis tools gain traction in India as SDL models mature
Static analysis tools are gaining popularity with Indian companies as software development models and perspectives mature. Here are some popular choices. Continue Reading
By- Varun Haran, Reporter
-
News
14 Sep 2012
Microsoft disrupts Nitol botnet, outs hidden PC malware
The Nitol botnet controlled more than 500 strains of embedded malware that Microsoft says has been plaguing the PC supply chain. Continue Reading
By- Robert Westervelt, TechTarget
-
News
13 Sep 2012
Government launches £3.8m cyber security institute
The government has ramped up moves to tackle growing cyber security threats by launching a £3.8m research institute. Continue Reading
By- Kathleen Hall, TechTarget
-
News
11 Sep 2012
Skills shortage means no unemployment in IT security, says (ISC)2
Zero unemployment in IT security shows a huge shortage of skills in the profession, says Hord Tipton, executive director of (ISC)2 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Sep 2012
Gartner: Prepare for context-aware security
Cloud computing, IT consumerisation and the evolving threat landscape are forcing IT departments to rethink security Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
10 Sep 2012
HDFC Bank’s ISO 27004-compliant security metrics a boost toward GRC
An ISO/IEC 27004-compliant metrics program is a rarity in the Indian infosec circuit. Indian BFSI major HDFC Bank’s ISMS has been there, done that Continue Reading
By- Varun Haran, Reporter
-
Photo Story
09 Sep 2012
DEF-CON Bangalore (DC9180) Meet Live
Get a front row view of the action-packed goings on at DEFCON Bangalore 2012 in this Live photo feature. Continue Reading
By- SearchSecurity.in Staff
-
News
07 Sep 2012
UK cookie law compliance mixed, study finds
Three months after the enforcement of the cookie law, only 12% of UK websites have prominent privacy notices and robust cookie controls, a study shows Continue Reading
-
Feature
05 Sep 2012
Setting up a botnet is easier than you think
Acquiring, installing, configuring and using a powerful data-stealing banking Trojan toolkit is not as difficult as it sounds Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Sep 2012
FBI denies link to leaked Apple device codes
The FBI says there is no evidence that Anonymous gained access to 12 million identity codes for Apple devices by hacking an FBI agent's laptop Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Sep 2012
Anonymous claims a million Apple IDs in FBI breach
Hacking group Anonymous claims to have released over a million Apple Unique Device Identifiers (UDIDs) obtained from breaching FBI networks Continue Reading
-
News
03 Sep 2012
Personal mobile policies lacking in IT
Just 23% of IT departments in the UK have a strategy for managing the use of personal devices on their corporate networks, according to new research Continue Reading
By- Jennifer Scott, TechTarget
-
News
03 Sep 2012
Powerful cyber attack tools widely available, say researchers
More low-level cyber criminals are getting access to sophisticated attack tools, say cyber intelligence specialists Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Sep 2012
Advanced cyber-security intelligence
Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools. Continue Reading
-
News
03 Sep 2012
Cyber Vulnerability Index
What does your online corporate profile reveal? With so many cyber attacks in the news recently, executives are becoming increasingly concerned about their organisation’s exposure to hackers. Continue Reading
-
Opinion
31 Aug 2012
How to survive a data breach
Six practical tips on how to prepare for and survive a data breach Continue Reading
By- Conrad Constantine
-
Photo Story
31 Aug 2012
Adopting BYOD culture sans chaos: An Indian perspective
The bring your own device (BYOD) concept is changing security and cost paradigms. We look at BYOD considerations for Indian businesses in this series. Continue Reading
By- SearchSecurity.in Staff
-
News
31 Aug 2012
Businesses worldwide fail to prepare for cyber threats, says Kaspersky Lab
Companies around the world have failed to address cyber threats, according to a survey from security organisation Kaspersky Lab Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Aug 2012
Amazon Appstore opens Android to attack
Amazon is urging users to switch off a safety feature in Android which prevents rogue apps from being downloaded, to install its Appstore software Continue Reading
By- Cliff Saran, Managing Editor
-
News
24 Aug 2012
VMware users can protect against virtual machine malware, says Trend Micro
New malware that attacks VMware virtual machines is no cause for undue concern, but users can take basic steps to protect data, says Trend Micro Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Aug 2012
SCC becomes first supplier to win G-Cloud security accreditation
IT infrastructure company SCC has become the first supplier on the government’s CloudStore to win pan-government security accreditation. Continue Reading
By- Kathleen Hall, TechTarget
-
News
21 Aug 2012
At least 9 out of 10 top mobile apps hacked, study shows
An average of 96% of the top 100 paid mobile apps have been hacked, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Aug 2012
More than 1,000 school application details leaked on the internet
Personal information about more than 1,000 children has been published on the UK Independent Schools Guide website after an alleged cyber attack Continue Reading
-
News
17 Aug 2012
Cyber security boot camp to educate potential cyber spooks
A group of about 30 young people will attend a cyber security boot camp announced by the organisations responsible for the Cyber Security Challenge next month. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Tip
14 Aug 2012
Mobile application security issues and threat vectors in enterprises
As mobile application security threats take on serious proportions, we explore the issues and risks involved for users and enterprises. Continue Reading
By- Ram Venkatraman
-
News
08 Aug 2012
Good data protection can be cheap and easy, says ICO
The ICO says charities and third sector organisations stand to benefit most from a data protection check-up. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Aug 2012
LinkedIn data breach costs more than $1m
LinkedIn says the forensic investigation and other recovery costs of the data breach in June could have topped $1m. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Aug 2012
RBS computer problem costs £125m
Royal Bank of Scotland will pay £125m in costs related to computer problems in June that meant customers could not access funds Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
01 Aug 2012
Compliance and risk
Compliance and risk managers have to overcome many challenges as a result of the data protection framework. This exclusive resource discusses some of the difficulties the European Union has to face because of regulations. Continue Reading
-
News
31 Jul 2012
Cyber threats affect banks worldwide
Nearly a quarter of the world's banks were hit by security breaches in the past year, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
27 Jul 2012
Cybergeddon: Pictures from the digital crime thriller
CSI creator Anthony E. Zuiker, brings to life the growing threat of cybercrime Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
27 Jul 2012
Twitter users targeted by Blackhole malware
Twitter users are being targeted by tweets containing malicious links that claim recipients are pictured in an online photo Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Jul 2012
SQL injection attacks rise sharply in second quarter of 2012
SQL injection (SQLi) attacks were up 69% in the second quarter of 2012 compared with the previous quarter, warns cloud hosting firm FireHost Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Jul 2012
Australian telco AAPT confirms Anonymous data breach
Australian telecoms firm AAPT confirms business customer data was breached by hacktivist group Anonymous at an external service provider Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jul 2012
Customers urged to boycott CSC over CIA 'torture flights'
CSC customers are being urged to boycott the supplier over allegations that it took part in illegal CIA rendition flights in the US "war on terror" Continue Reading
By -
News
25 Jul 2012
Siemens issues software fix to protect against Stuxnet
German engineering firm Siemens has issued a fix for the software vulnerabilities in its programmable logic controllers that were exploited by the computer virus Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
24 Jul 2012
Nine must-have OSINT tools
Open source intelligence tools aid in target discovery during the reconnaissance phase. Here are nine must-have OSINT tools for finding maximum target info. Continue Reading
By- Karthik Poojary, Amazon
-
News
19 Jul 2012
Many global firms unaware of online risk, finds KPMG
Many global organisations could do a lot more to protect their private data and reduce exposure to attacks by hackers, according to KPMG Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2012
Security researchers join forces to bring down Grum botnet
Security researchers have collaborated to take down Grum, the world’s third-largest botnet of hijacked computers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2012
Government-sponsored hackers target commercial secrets
Government-sponsored organisations are increasingly turning to hacking techniques to steal commercial secrets from businesses, KPMG has warned Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
17 Jul 2012
Skype works to fix privacy bug as instant messages leak
Internet telephony service Skype has confirmed that a bug in its software has been sending copies of instant messages to unintended recipients Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
17 Jul 2012
A free risk assessment template for ISO 27001 certification
Risk assessment is the first important step towards a robust information security framework. Our simple risk assessment template for ISO 27001 makes it easy. Continue Reading
By- Sanil Nadkarni, Capitas
-
News
16 Jul 2012
Sophos combines endpoint security and UTM
Security firm Sophos combines endpoint protection and unified threat management (UTM) products into a single physical or virtual appliance Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
16 Jul 2012
Best practice in outsourcing security
The issues CIOs must consider in balancing security needs and budgetary constraints Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Jul 2012
Outsourcing the problem of software security
This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle. Continue Reading
-
News
12 Jul 2012
Metropolitan Police gears up to analyse smartphone evidence
The Metropolitan Police plans to build a computer system to analyse photo and video evidence gathered from the public using mobile phones Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
11 Jul 2012
The history of the next-generation firewall
Security expert Rik Ferguson explains how next-generation firewalls were developed and what protection they provide businesses. Continue Reading
By- Rik Ferguson