Privacy and data protection
-
News
20 Dec 2024
Top 10 data and ethics stories of 2024
Here are Computer Weekly’s top 10 data and ethics stories of 2024 Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
18 Dec 2024
The Security Interviews: Martin Lee, Cisco Talos
Threat intel expert and author Martin Lee, EMEA technical lead for security research at Cisco Talos, joins Computer Weekly to mark the 35th anniversary of the first ever ransomware attack Continue Reading
By- Alex Scroxton, Security Editor
-
News
27 Jan 2016
New government plan to support cyber security startups
Government has announced a £250,000 programme to increase the rate of cyber security startup development in the UK Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jan 2016
Average DDoS attacks fatal to most businesses, report reveals
Criminal activity is top motivation for DDoS attacks as average attacks become strong enough to down most businesses, Arbor Networks report reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
26 Jan 2016
Beyond India – the emerging outsourcing destinations
In this week’s Computer Weekly, we look at the growing number of offshore alternatives to the dominant outsourcing destination of India and assess their relative merits. We examine how to respond if your organisation is affected by a data breach. And we analyse how virtualisation technology can help improve your disaster recovery strategy. Read the issue now. Continue Reading
-
News
22 Jan 2016
$54m cyber fraud hits aircraft supplier share price
Austrian aircraft industry supplier reports cyber fraud loss of $54m, way above the average cost of the worst breaches in the UK of up to $4.4m in 2015 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jan 2016
Candy Crush maker King secures mobile access through cloud
Candy Crush maker King.com uses cloud-based Duo Security authentication for access to cloud services, customised apps and remote VPNs Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jan 2016
Most Android devices running outdated versions
Nearly a third of Android devices in enterprises today are running version 4.0 or older of the operating system, leaving them highly susceptible to vulnerabilities, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
19 Jan 2016
Is government surveillance going too far?
In this week’s Computer Weekly, as the UK prepares new laws on surveillance and data collection, we hear from security experts on the challenges of balancing privacy and security and their insider view on GHCQ and the NSA. We examine the growing threat of ransomware and how to tackle it. And we look at the implications of new EU data protection rules. Read the issue now. Continue Reading
-
News
19 Jan 2016
Australian prime minister Malcolm Turnbull calls for free, open and secure internet
International norms of behaviour should prohibit states from conducting cyber intellectual property theft, says Australian prime minister Malcolm Turnbull Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Jan 2016
Chinese university targeted by Islamic State hacktivist
Beijing’s Tsinghua University is the latest organisation to be attacked by hackers with a social or political agenda Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Jan 2016
UK not involved in mass surveillance, says Theresa May
Coffee shops and libraries could be the target of interception warrants, Theresa May tells MPs and peers Continue Reading
By- Julia Gregory
-
News
13 Jan 2016
Watchdog urges US nuclear agency to close cyber security gaps
An audit report has called on the US nuclear agency to revise its IT contracts to ensure better cyber security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Jan 2016
Firms can monitor employees’ online chats, EU court rules
Human rights court says it is not unreasonable for employers to want to verify that staff are completing their professional tasks during working hours Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jan 2016
ICO reiterates call for stronger sentences for data theft
The information commissioner (ICO) reiterates his call for stronger sentences for data theft after a court fined a woman just £1,000 for selling 28,000 customer records Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Jan 2016
Tech firms critical of UK draft Investigatory Powers Bill
Facebook, Google, Microsoft, Twitter and Yahoo say they are particularly concerned about six key aspects of the UK's draft Investigatory Powers Bill Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jan 2016
UK IoT research hub opens with support from academic world
A consortium of nine UK universities have come together to work alongside the Engineering and Physical Sciences Research Council on research into the internet of things Continue Reading
By- Alex Scroxton, Security Editor
-
News
06 Jan 2016
Upgrade to Internet Explorer 11 to reduce risk
Failure to update to the latest version of Internet Explorer by 12 January 2016 could put users at risk, Microsoft warns Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
05 Jan 2016
Interview: James Bamford on surveillance, Snowden and technology companies
Investigative journalist and documentary maker James Bamford was among the first to uncover the secrets of the US National Security Agency and its global surveillance Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
31 Dec 2015
Top 10 internet of things stories of 2015
2015 was the year the internet of things began to move from theory to widespread practice, and the fledgling industry shook off the millstone of connected kitchen appliances Continue Reading
By- Alex Scroxton, Security Editor
-
News
24 Dec 2015
Top 10 IT security stories of 2015
Computer Weekly looks back at the most significant stories on IT security in the past 12 months Continue Reading
By- Warwick Ashford, Senior analyst
-
News
23 Dec 2015
Top 10 cyber crime stories of 2015
Computer Weekly takes a look back at the top cyber crime stories of 2015 Continue Reading
By- Warwick Ashford, Senior analyst
-
E-Zine
16 Dec 2015
Cloud IT is helping Uefa meet its goals
In this week’s Computer Weekly, we find out how cloud computing is helping European football federation Uefa with preparations for the Euro2016 tournament. We ask if UK government moves to support IT education are enough to bridge the skills gap. And we examine the new international standard for personal data privacy in the cloud and what it means for suppliers. Read the issue now. Continue Reading
-
News
15 Dec 2015
Bracknell man arrested over VTech toy hack
Police have arrested a 21-year-old man in connection with the hacking of Hong Kong-based toymaker VTech Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Dec 2015
Eight startups selected for Cyber London security accelerator programme
Cyber London has selected startups from the UK, Finland, Hungary, Israel, Brazil and South Africa for its second cyber security accelerator programme Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Dec 2015
UK firms act quickly to fix payment card data encryption
Security firm found that 16 global companies had failed to effectively encrypt traffic to the payment portion of their websites and apps Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
10 Dec 2015
How to deal with the aftermath of a data breach
Considering that a data breach could happen to any company, at any time, a plan of action is the best tactic Continue Reading
By -
Feature
07 Dec 2015
The next stage in quantum key distribution
Authentication schemes based on quantum physics are emerging to address the growing number of ways to compromise data traffic Continue Reading
-
Guide
07 Dec 2015
Essential guide to data breaches, the dark web and the hidden data economy
In this guide, we look at the aftermath of a data breach - what do cyber criminals use that stolen data for, and what can companies do to avoid becoming a victim? Continue Reading
-
News
04 Dec 2015
Wetherspoon pub chain warns customers of data breach
Discovery of a data breach at JD Wetherspoons comes hard on the heels of a breach at TalkTalk, underlining the importance of keeping customer data safe Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Dec 2015
Veracode finds most web apps fail Owasp security check list
The findings of a report on critical vulnerabilities in most web applications is raising concerns over potential security vulnerabilities in millions of websites Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Dec 2015
The US and China agree more steps to fight cyber crime
The US and China have made progress in expanding co-operation on cyber crime as China claims criminals and not state-backed hackers broke into the US Office of Personnel Management Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Dec 2015
Workday ringfences support in Europe after Safe Harbour ruled unsafe
US cloud HR and financial services provider reponds to Safe Harbour failure by ringfencing European data Continue Reading
By- Bill Goodwin, Computer Weekly
-
News
01 Dec 2015
Security analytics needs practical approach, says Fico Ciso Vickie Miller
Analytics must form part of a comprehensive defence-in-depth strategy, according to chief information security officer (Ciso) Vickie Miller at software firm Fico Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Nov 2015
Use legal protection to soften cyber attack impact, says Kemp Little
IT outsourcing provides an opportunity for businesses to transfer risk and recover losses from cyber attacks, says law firm Kemp Little Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Nov 2015
Dridex banking Trojan regains strength to mount attacks on the UK
Fresh Dridex banking Trojan campaigns target the US, UK and France – despite a recent law enforcement takedown operation – warn security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Nov 2015
Data breach hits Hilton Worldwide hotel chain
Hilton Worldwide says malware found its way onto point of sale (PoS) systems and enabled attackers to steal payment card information Continue Reading
By- Warwick Ashford, Senior analyst
-
News
24 Nov 2015
Defence review promises 1.2% of defence budget spend on technology
The government’s defence review highlights need for technology investment, innovative ideas and cyber security Continue Reading
By -
News
20 Nov 2015
Five key strategies for IoT success
Companies need to be agile because in some IoT systems, it will be a question of the winner taking it all, according to Kent Eriksson, IoT business consultant at PTC Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Nov 2015
Coalition of top tech firms opposes weakened encryption
Weakening security with the aim of advancing security simply does not make sense, a coalition of top tech firms tells US president Barack Obama Continue Reading
By- Warwick Ashford, Senior analyst
-
News
18 Nov 2015
Cyber security mindset needs to change, says report
Government organisations are prime targets for cyber attacks, leading to increased importance on robust information security, according to a report by Intel Security and the Digital Government Security Forum Continue Reading
By -
News
12 Nov 2015
Three men charged over JP Morgan hacking and fraud
Exploiting the Heartbleed bug was one of the methods used by three men charged in connection with the theft of more than 100 million customer data records from financial institutions to carry out "pump and dump" fraud Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Nov 2015
Snoopers’ charter will force ISPs to raise broadband prices
The Science and Technology Select Committee hears that ISPs may be forced to put up their service charges to cover the cost of retaining communications data, should the Investigatory Powers Bill become law Continue Reading
By- Alex Scroxton, Security Editor
-
News
11 Nov 2015
Germany is finalising legislation to shore up CNI cyber security
Germany is working to ensure digital sovereignty through IT security legislation and negotiations on IT security regulations and transatlantic trade at a European Union level Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Nov 2015
EU data protection official optimistic on successor to Safe Harbour
An EU data protection official says he is optimistic that an alternative to the Safe Harbour agreement will be found, but it will take work from both the US and the EU Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
06 Nov 2015
Avoiding security issues when recycling hardware
What are the options for the environmentally and ethically responsible recycling of end-of-life hardware, without compromising data security? Continue Reading
-
E-Zine
05 Nov 2015
CW Europe – November 2015
Cloud computing has huge benefits to businesses in Europe, but data protection rules have been different for organisations in different parts of Europe. This is about to change with the final version of the General Data Protection Regulation (GDPR) expected soon. All 28 EU member states will have one set of rules to follow. Continue Reading
-
News
04 Nov 2015
UAE recognises importance of cyber security, says official
Like the UK, the UAE federal government has identified the importance of creating an environment in which it is safe to do business online Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Nov 2015
Theresa May proposes bulk data and internet tracking under the Investigatory Powers Bill
The home secretary has unveiled the draft Investigatory Powers Bill, which sets out the government's plans to collect data on UK citizens' internet use Continue Reading
By- Cliff Saran, Managing Editor
-
News
02 Nov 2015
000Webhost blames PHP exploit for breach of 13.5 million records
Unencrypted passwords for a free web hosting firm were on sale for five months before customers were notified their records had been leaked, according to a security researcher Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Nov 2015
Theresa May promises strong oversight in surveillance bill
The proposed Investigatory Powers Bill contains “very strong” oversight and “world-beating” authorisation procedures, according to home secretary Theresa May Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Oct 2015
Law enforcement cracks down on DroidJack Android snooping malware users
A joint EU/US operation on the DroidJack malware is the latest example of international collaboration between law enforcement officers directed at cyber crime Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Oct 2015
M&S data breach forces retailer to temporarily suspend service
A glitch that allowed online customers to see each others' details forced retailer Mark & Spencer to take its website offline while it resolved the issue Continue Reading
By- Clare McDonald, Business Editor
-
E-Zine
26 Oct 2015
Blockchain sparks change in banking industry
In this week's Computer Weekly, we find out why blockchain, the technology that underpins bitcoin, is making waves in the banking sector. EasyJet tells us why digital is increasingly important for airlines. And we look at the forces driving digital disruption and why some sectors are changing faster than others. Read the issue now. Continue Reading
-
News
23 Oct 2015
TalkTalk warns customers about personal data breach
TalkTalk has warned customers their personal data may have been compromised in the second cyber attack on the firm in 2015, with some data left unencrypted Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Oct 2015
Police and industry to tackle cyber crime together, says TechUK
A TechUK report calls for collaboration between police and industry to raise standards of reporting, recording and responding to cyber crime Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Oct 2015
Infosec pros should start preparing for the future, say experts
Information security professionals need to grow their skills, engage with the business, increase security awareness, set business goals and tailor their messages, says a panel of experts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Oct 2015
Dow Jones denies it was target of insider trading hack
Dow Jones says there is no information to support reports that it was the target of hackers seeking information for insider trading Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Oct 2015
Yahoo announces password-killing Account Key
Yahoo Account Key uses push notifications to provide a fast and secure way to access Yahoo accounts from a mobile device Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
15 Oct 2015
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
News
13 Oct 2015
Cyber security innovation is crucial, says security evangelist
Visibility and automation are key areas of cyber security innovation, but firms should concentrate first on the basics and not overlook the human element of security Continue Reading
By- Warwick Ashford, Senior analyst
-
News
12 Oct 2015
NHS Health Apps Library to close
The NHS Health Apps Library is shutting down after a two-year tenure, shortly after NHS-approved apps were found to leak data Continue Reading
By -
E-Zine
12 Oct 2015
Europe's data privacy shake-up
In this week's Computer Weekly, after the European Court of Justice ruled the Safe Harbour agreement invalid, we assess the implications for transatlantic data protection. We find out why DVLA has brought its IT back in-house after a 13-year outsourcing deal. And we look at the role of IT in cutting costs in the NHS. Read the issue now. Continue Reading
-
Feature
09 Oct 2015
The security dangers of home networks
Most companies take reasonable steps to protect their networks from virus attacks, but one area of vulnerability that is often overlooked is infection from employees’ home networks Continue Reading
-
Feature
09 Oct 2015
How to ensure strong passwords and better authentication
Five steps to ensure stronger passwords and better authentication to reduce the threat of business data theft Continue Reading
By- Peter Wood, First Base Technologies LLP
-
News
09 Oct 2015
Apple removes more iOS apps over security concerns
Apple has blocked more apps over security concerns just weeks after ridding the App Store of XcodeGhost malware Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Oct 2015
Samsung Pay isolated from LoopPay attack
Hackers who compromised LoopPay’s computer systems had no access to Samsung Pay’s user data or other core information, says Samsung Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Oct 2015
Singapore and UK researchers investigate privacy in big data era
Academic organisations in Singapore and the UK collaborate on the privacy questions raised by big data and the cloud Continue Reading
By- Tao ai Lei
-
Feature
06 Oct 2015
Max Schrems: The man who broke Safe Harbour
Schrems has persuaded a high court judge to confirm that Edward Snowden’s evidence is acceptable in court and that the US is engaged in mass surveillance of European citizens Continue Reading
By -
News
06 Oct 2015
Researchers find credential-stealing webmail server APT attack
Security researchers have discovered a new and unique advanced persistent threat (APT) technique that involves a malicious module loaded onto a webmail server Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Oct 2015
Facebook ruling not only landmark data protection case in Europe, say experts
A landmark ruling against Slovakia-based website Weltimmo could impact the Max Schrems case against Facebook and new European data protection rules currently being finalised Continue Reading
By- Warwick Ashford, Senior analyst
-
News
02 Oct 2015
David Jones online customers hit by data breach
Hackers have accessed the personal details of an unknown number of David Jones online customers, but the retailer says payment details and passwords are not affected Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Sep 2015
Medical devices must be secure by design, say industry experts
The information security industry is calling for medical device manufacturers to design and build cyber security into all internet-enabled devices after thousands are found to be hackable Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Sep 2015
120-day patching gap puts many firms at risk of cyber attack, study shows
The probability of a vulnerability being exploited hits 90% between 40-60 days after discovery, but many firms are taking up to 60 days beyond that to patch, while others are failing to patch at all, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
25 Sep 2015
How to fully test IT networks for vulnerabilities
Making sure a company network is secure is a very important task, and one that should be scheduled regularly Continue Reading
By -
News
22 Sep 2015
Is Microsoft Office 2016 reliable enough for business?
A day after a major Skype outage, Microsoft unveils Office 2016, which, ironically, offers tight integration with Skype Continue Reading
By- Cliff Saran, Managing Editor
-
News
21 Sep 2015
Department for Culture, Media and Sport takes over responsibility for data protection policy
Government transfers responsibility for data protection policy and ICO oversight from Ministry of Justice (MOJ) to Department for Culture, Media and Sport (DCMS) Continue Reading
By- Alex Scroxton, Security Editor
-
News
21 Sep 2015
Health chief 'should be held to account' for whistleblow errors
Former nurse and clincial commissioner Bernie Rochford claims unfair dismissal after blowing the whistle on IT problems which put patient care at risk Continue Reading
By- Julia Gregory and Bill Goodwin
-
News
16 Sep 2015
BT launches ethical hacking service for bankers
BT introduces a certified Crest Star ethical hacking test service for financial services customers Continue Reading
By- Alex Scroxton, Security Editor
-
News
15 Sep 2015
Most DDoS attacks hiding something more sinister, Neustar warns
Smaller DDoS attacks can be more dangerous than a powerful attack that knocks a company offline but does not install malware or steal data, warns Neustar Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Sep 2015
NHS trust denies bullying and intimidation of IT whistleblower
Managers were already aware of whistleblower's concerns about the accuracy of NHS Southwark's data, tribunal hears Continue Reading
By- Bill Goodwin and Julia Gregory
-
News
14 Sep 2015
RSA Group flags ID theft risk to Lloyds Bank customers following datacentre storage theft
International insurance group has seen 500 customers take up offer of identity theft protection in wake of datacentre theft Continue Reading
By- Caroline Donnelly, Senior Editor, UK
-
News
11 Sep 2015
Security industry welcomes GCHQ password guidelines
GCHQ's guidance on password policy covers some of the most pressing issues facing UK businesses and employees today, according to Skyhigh Networks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Sep 2015
US health insurer Excellus BlueCross BlueShield hit by data breach
Forensic investigation reveals a data breach at US health insurer Excellus BlueCross BlueShield exposing up to 11 million records 21 months after the first intrusion Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 Sep 2015
Cloudian boosts object storage HyperStore compliance features
Distributed object storage software maker Cloudian upgrades HyperStore with added granularity of data protection features that can help meet compliance requirements Continue Reading
By- Antony Adshead, Storage Editor
-
News
09 Sep 2015
Security pros failing to address digital certificate risks, survey shows
Even though 90% of security professionals believe a leading CA will be compromised in next two years, only 13% have existing automation to deal with that happening Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Sep 2015
Conventional security measures hit productivity, study shows
Most IT professionals say context-aware security would improve productivity without compromising security, a survey from Dell reveals Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 Sep 2015
Security vulnerability management more than patching, warns Secunia
Keeping track of what makes an IT environment vulnerable is an ongoing and complex task, according to Secunia Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Sep 2015
US State Department plans cyber security playbook
The US State Department issues a request for information to determine the capabilities of commercial industry to provide and maintain a cyber security playbook Continue Reading
By- Warwick Ashford, Senior analyst
-
News
01 Sep 2015
Use 2FA to mitigate KeyRaider iOS malware, says Rapid7
KeyRaider iOS malware targeting iPhone users in China and 17 other countries including the UK has raised enterprise security concerns Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 Aug 2015
Police arrest six UK teenagers for using DDoS cyber attack tool
Police arrest six UK teenagers on suspicion of using a DDoS attack tool targeting a national newspaper, a school and online gaming companies and retailers Continue Reading
-
News
27 Aug 2015
Rapid7 calls on router makers to eliminate backdoors
Until manufacturers stop using default passwords, we will continue to see opportunistic attacks on home and small business routers, says Rapid7's Tod Beardsley Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Aug 2015
Many firms not getting to grips with third-party data security risk
Supply chain data security risk is pervasive, but being unable to deal with it is down to basic failings, says a cyber risk expert Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Aug 2015
Sans Institute identifies top UK cyber talent
The cream of UK cyber security talent selected from 24,000 candidates are set to begin eight weeks of intensive training in the first-ever intake at the Sans UK Cyber Academy Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
25 Aug 2015
Life’s a breach: How to handle the press after a hacking attack
Emily Dent, specialist in crisis PR, offers some advice to organisations that unexpectedly find themselves in the headlines Continue Reading
By- Emily Dent
-
News
24 Aug 2015
Spotify to update privacy policy after user protest
Some Spotify users are unhappy about new privacy policies that allow access to users’ photos, video, mobile device location, voice controls and contacts Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Aug 2015
ICO orders Google to remove links to right to be forgotten takedowns
The Information Commissioner's Office (ICO) says Google must remove newer links that reveal the same details as previously removed links Continue Reading
-
News
20 Aug 2015
Broadband Stakeholder Group to review UK net neutrality policy
The Broadband Stakeholder Group commissions an independent review into the UK’s industry-led approach to net neutrality and the open internet Continue Reading
By- Alex Scroxton, Security Editor
-
News
20 Aug 2015
Mumsnet suffers multi-vector cyber attack
Mumsnet has been hit by a DDoS attack, its admin hacked and data stolen, and then a hoax call sent armed police to the home of the organisation's co-founder, Justine Roberts Continue Reading
-
News
20 Aug 2015
Premiership Rugby scores security and efficiency with Intralinks
By setting access controls, Premiership Rugby can ensure that its partners get quick access only to role-appropriate content Continue Reading
By- Warwick Ashford, Senior analyst
-
News
17 Aug 2015
AT&T a key NSA partner in internet spying Snowden docs show
The NSA considered its relationship with AT&T to be unique and especially productive, leaked documents show Continue Reading
By- Warwick Ashford, Senior analyst
-
News
16 Aug 2015
Mobile phone users at risk as hackers bug and track victims
An investigation by Australian TV show 60 Minutes demonstrates how hackers based thousands of miles away in Germany were able to record the calls of an Australian senator and track his movements Continue Reading
By- Ross Coulthart, 60 Minutes Australia