IT security

Email Alerts

Register now to receive ComputerWeekly.com IT-related news, guides and more, delivered to your inbox.
By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy
  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • USB-connected devices present cyber vulnerabilities

    Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers

  • Global Risks 2014

    Cybercrime and government surveillance pose a risk to the internet comparable in a scale comparable to the 2008 financial melt-down, the World Economic Forum warns in this analysis of the risks facing business and governments in 2014. The report assesses the impact of cybercrime and government surveillance on the public’s trust in the internet, and warns that the potential fragmentation of the internet could have a serious impact on the global economy. The World Economic Forum’s Global Risks 2014 report identifies cyberattack as one of the most likely global risks in 2014 and the breakdown of critical information infrastructure as among the global risks likely to have the most impact. The report analyses 31 global risks and includes a special in-depth investigation into digital disintegration. Other risks of significant concern include income disparity, extreme weather events, unemployment and fiscal crises.

  • Time puts servers at risk of denial-of-service attacks

    The Network Timing Protocol, which is used to keep servers on the internet synchronised, could become a major vector of attack for hackers

  • NSA insiders reveal what went wrong

    In this memo to President Obama, dated January 2013, former employees of the US electronic intelligence agency explain how NSA leaders allegedly failed in their intelligence collection and analysis before 9/11, covered up the mistakes, violated the US constitution, wasted billions of dollars on technology and mislead the public.

  • Russian hackers steal over a billion usernames and passwords

    A group of Russian cyber criminals have attacked 500 million email addresses and gained 1.2 billion usernames and passwords

  • Malware incidents make up 25% of CERT-UK's work in first 100 days

    Over half the incidents reported to CERT-UK in the first three months of its operation were not related to critical national infrastructure

  • Recommendations on rolling back government surveillance

    Legislation, judicial review through the FISA Court, and testimony have failed utterly in terms of providing meaningful oversight - both historically and currently – over the US electronic intelligence gathering organisation, the NSA, 4 former senior NSA staff argue in this report. They present their recommendations for reform. This report was compiled by 4 former senior NSA staff: William Binney, former Technical Director, World Geopolitical & Military Analysis; Co-founder of the SIGINT Automation Research Center. Thomas Drake, former Defense Intelligence Senior Executive Service, NSA Edward Loomis, former Chief, SIGINT Automation Research Center, NSA J. Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA

  • Access "The future of digital forensics"

    This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption.

  • VIEW MORE ON : Antivirus
  • What ingredients go into the successful app store?

    An enterprise app store should provide the controlled availability of apps for employees.We look at what is available for organisations to use

  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • Automating Information Governance - assuring compliance

    In the past twelve months, the impact of data leaks and security breaches, most especially the Edward Snowdon activities, has brought the security and privacy elements of information governance strongly into play. Metadata has become an issue for front-page news, and heads-of-state discuss individuals’ rights to data privacy and information deletion. Meanwhile, massive data leaks of personal information have damaged corporate reputations and hardened already strong views in some jurisdictions. We therefore need to work harder to protect live content and preserve content records, but the volume, velocity and variety of content generation makes it nearly impossible to manually maintain and enforce the policies we so earnestly set. In this report we take an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

  • Financial Services Data Privacy and Data Migration

    Keith Bucknall, head of Strategy, Architecture & Infrastructure for Lloyds motor insurer, ERS, looks at the data protection challenges faced by the organisation, in this PowerPoint presentation for Computer Weekly’s 500 Club for IT leaders. You can read more about his presentation here.

  • Global Risks 2014

    Cybercrime and government surveillance pose a risk to the internet comparable in a scale comparable to the 2008 financial melt-down, the World Economic Forum warns in this analysis of the risks facing business and governments in 2014. The report assesses the impact of cybercrime and government surveillance on the public’s trust in the internet, and warns that the potential fragmentation of the internet could have a serious impact on the global economy. The World Economic Forum’s Global Risks 2014 report identifies cyberattack as one of the most likely global risks in 2014 and the breakdown of critical information infrastructure as among the global risks likely to have the most impact. The report analyses 31 global risks and includes a special in-depth investigation into digital disintegration. Other risks of significant concern include income disparity, extreme weather events, unemployment and fiscal crises.

  • NSA insiders reveal what went wrong

    In this memo to President Obama, dated January 2013, former employees of the US electronic intelligence agency explain how NSA leaders allegedly failed in their intelligence collection and analysis before 9/11, covered up the mistakes, violated the US constitution, wasted billions of dollars on technology and mislead the public.

  • Russian hackers steal over a billion usernames and passwords

    A group of Russian cyber criminals have attacked 500 million email addresses and gained 1.2 billion usernames and passwords

  • Malware incidents make up 25% of CERT-UK's work in first 100 days

    Over half the incidents reported to CERT-UK in the first three months of its operation were not related to critical national infrastructure

  • Recommendations on rolling back government surveillance

    Legislation, judicial review through the FISA Court, and testimony have failed utterly in terms of providing meaningful oversight - both historically and currently – over the US electronic intelligence gathering organisation, the NSA, 4 former senior NSA staff argue in this report. They present their recommendations for reform. This report was compiled by 4 former senior NSA staff: William Binney, former Technical Director, World Geopolitical & Military Analysis; Co-founder of the SIGINT Automation Research Center. Thomas Drake, former Defense Intelligence Senior Executive Service, NSA Edward Loomis, former Chief, SIGINT Automation Research Center, NSA J. Kirk Wiebe, former Senior Analyst, SIGINT Automation Research Center, NSA

  • VIEW MORE ON : IAM
  • MoD sponsors cyber defence automation competition

    The Ministry of Defence has announced £2m funding for a competition to find innovative ways of automating cyber defences

  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • Chromebooks set to replace low-cost PCs

    By 2017, sales of Chromebooks are set to reach 14.4 million units, according to Gartner, as PC makers target low-cost computing

  • USB-connected devices present cyber vulnerabilities

    Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers

  • Redfern deploys Splunk to comply with Information Assurance

    Travel management company Redfern has deployed Splunk for proactive monitoring

  • Automating Information Governance - assuring compliance

    In the past twelve months, the impact of data leaks and security breaches, most especially the Edward Snowdon activities, has brought the security and privacy elements of information governance strongly into play. Metadata has become an issue for front-page news, and heads-of-state discuss individuals’ rights to data privacy and information deletion. Meanwhile, massive data leaks of personal information have damaged corporate reputations and hardened already strong views in some jurisdictions. We therefore need to work harder to protect live content and preserve content records, but the volume, velocity and variety of content generation makes it nearly impossible to manually maintain and enforce the policies we so earnestly set. In this report we take an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

  • Data protection, privacy and the IT department

    Mike Cope, IT Director, University College London, looks at the data protection challenges faced by the university in this PowerPoint presentation for Computer Weekly’s 500 Club for IT leaders.

  • Wi-Fi users not concerned about hotspot security

    Ofcom report uncovers a blasé attitude to wireless security among users

  • Financial Services Data Privacy and Data Migration

    Keith Bucknall, head of Strategy, Architecture & Infrastructure for Lloyds motor insurer, ERS, looks at the data protection challenges faced by the organisation, in this PowerPoint presentation for Computer Weekly’s 500 Club for IT leaders. You can read more about his presentation here.

  • VIEW MORE ON : Risk management
  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • USB-connected devices present cyber vulnerabilities

    Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers

  • Global Risks 2014

    Cybercrime and government surveillance pose a risk to the internet comparable in a scale comparable to the 2008 financial melt-down, the World Economic Forum warns in this analysis of the risks facing business and governments in 2014. The report assesses the impact of cybercrime and government surveillance on the public’s trust in the internet, and warns that the potential fragmentation of the internet could have a serious impact on the global economy. The World Economic Forum’s Global Risks 2014 report identifies cyberattack as one of the most likely global risks in 2014 and the breakdown of critical information infrastructure as among the global risks likely to have the most impact. The report analyses 31 global risks and includes a special in-depth investigation into digital disintegration. Other risks of significant concern include income disparity, extreme weather events, unemployment and fiscal crises.

  • Russian hackers steal over a billion usernames and passwords

    A group of Russian cyber criminals have attacked 500 million email addresses and gained 1.2 billion usernames and passwords

  • Malware incidents make up 25% of CERT-UK's work in first 100 days

    Over half the incidents reported to CERT-UK in the first three months of its operation were not related to critical national infrastructure

  • Home Business Continuity: Availability, recovery and archive Business Continuity: Availability, rec

    Changes in how technology can be implemented and improvements in connectivity mean that business continuity and rapid systems recovery is now within the reach of many more organisations. Combined with granular information recovery, organisations should now be looking at creating a multi-level strategy to ensure not only survival, but also on-going business capabilities through any impact on the technical platform.

  • Jericho Forum: Data Protection

    This white paper contends that data protection to meet today's and tomorrow's requirements needs to provide stronger, more flexible protection mechanisms around the data itself. It reviews the issues surrounding data protection today, then assesses what properties data protection mechanisms should have to meet current and future requirements, and considers why current technologies don't deliver what is required. It goes on to propose data protection principles for evaluating how adequately any given data protection mechanism performs in meeting key requirements. Having painted this canvas, it looks at the evolution of past measures to protect data, and from that derives a step-by-step path predicting how data protection can be developed to meet the security needs of the future.

  • Targeted attacks and how to defend against them

    For years businesses have striven to keep malware, spam and unwanted intruders at bay with varying degrees of success. Much of the protection they have put in place assumes that most of these attacks will be random and that, if an organisation’s defences are too hard to breach, the attacker will seek an easier victim. That situation is changing fast with the rise of targeted attacks (or advanced persistent threats/APTs), where both cyber-criminals and hacktivists are targeting selected organisations and persisting until they achieve their goals. New research presented in this report underlines the scale and real impact of the problem, the measures being taken to defend against targeted attacks and how effective they are. It should be of interest to anyone charged with defending their businesses against contemporary cyber threats or who wants to better understand their organisation’s vulnerability.

  • Security Think Tank: Design and build in security and resilience from the start

    How can organisations build cyber security resilience?

  • VIEW MORE ON : Continuity
  • US supermarket retail chain Supervalu reports cyber breach

    Supermarket chain Supervalu is the latest in a string of US retailers to report a breach of its card payment network

  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • USB-connected devices present cyber vulnerabilities

    Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers

  • Automating Information Governance - assuring compliance

    In the past twelve months, the impact of data leaks and security breaches, most especially the Edward Snowdon activities, has brought the security and privacy elements of information governance strongly into play. Metadata has become an issue for front-page news, and heads-of-state discuss individuals’ rights to data privacy and information deletion. Meanwhile, massive data leaks of personal information have damaged corporate reputations and hardened already strong views in some jurisdictions. We therefore need to work harder to protect live content and preserve content records, but the volume, velocity and variety of content generation makes it nearly impossible to manually maintain and enforce the policies we so earnestly set. In this report we take an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

  • Data protection, privacy and the IT department

    Mike Cope, IT Director, University College London, looks at the data protection challenges faced by the university in this PowerPoint presentation for Computer Weekly’s 500 Club for IT leaders.

  • Financial Services Data Privacy and Data Migration

    Keith Bucknall, head of Strategy, Architecture & Infrastructure for Lloyds motor insurer, ERS, looks at the data protection challenges faced by the organisation, in this PowerPoint presentation for Computer Weekly’s 500 Club for IT leaders. You can read more about his presentation here.

  • Global Risks 2014

    Cybercrime and government surveillance pose a risk to the internet comparable in a scale comparable to the 2008 financial melt-down, the World Economic Forum warns in this analysis of the risks facing business and governments in 2014. The report assesses the impact of cybercrime and government surveillance on the public’s trust in the internet, and warns that the potential fragmentation of the internet could have a serious impact on the global economy. The World Economic Forum’s Global Risks 2014 report identifies cyberattack as one of the most likely global risks in 2014 and the breakdown of critical information infrastructure as among the global risks likely to have the most impact. The report analyses 31 global risks and includes a special in-depth investigation into digital disintegration. Other risks of significant concern include income disparity, extreme weather events, unemployment and fiscal crises.

  • NSA insiders reveal what went wrong

    In this memo to President Obama, dated January 2013, former employees of the US electronic intelligence agency explain how NSA leaders allegedly failed in their intelligence collection and analysis before 9/11, covered up the mistakes, violated the US constitution, wasted billions of dollars on technology and mislead the public.

  • Russian hackers steal over a billion usernames and passwords

    A group of Russian cyber criminals have attacked 500 million email addresses and gained 1.2 billion usernames and passwords

  • VIEW MORE ON : Data Breach Incident Management and Recovery
  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • Google to favour secure websites in search rankings

    Google is starting to favour secure websites and is ranking them higher on its search engine

  • Data protection, privacy and the IT department

    Mike Cope, IT Director, University College London, looks at the data protection challenges faced by the university in this PowerPoint presentation for Computer Weekly’s 500 Club for IT leaders.

  • Wi-Fi users not concerned about hotspot security

    Ofcom report uncovers a blasé attitude to wireless security among users

  • Global Risks 2014

    Cybercrime and government surveillance pose a risk to the internet comparable in a scale comparable to the 2008 financial melt-down, the World Economic Forum warns in this analysis of the risks facing business and governments in 2014. The report assesses the impact of cybercrime and government surveillance on the public’s trust in the internet, and warns that the potential fragmentation of the internet could have a serious impact on the global economy. The World Economic Forum’s Global Risks 2014 report identifies cyberattack as one of the most likely global risks in 2014 and the breakdown of critical information infrastructure as among the global risks likely to have the most impact. The report analyses 31 global risks and includes a special in-depth investigation into digital disintegration. Other risks of significant concern include income disparity, extreme weather events, unemployment and fiscal crises.

  • Can BlackBerry remain in the mobile enterprise?

    BlackBerry is ramping up its drive to remain relevant following recent moves by IBM and Microsoft to target the mobile enterprise

  • NSA insiders reveal what went wrong

    In this memo to President Obama, dated January 2013, former employees of the US electronic intelligence agency explain how NSA leaders allegedly failed in their intelligence collection and analysis before 9/11, covered up the mistakes, violated the US constitution, wasted billions of dollars on technology and mislead the public.

  • Russian hackers steal over a billion usernames and passwords

    A group of Russian cyber criminals have attacked 500 million email addresses and gained 1.2 billion usernames and passwords

  • Malware incidents make up 25% of CERT-UK's work in first 100 days

    Over half the incidents reported to CERT-UK in the first three months of its operation were not related to critical national infrastructure

  • VIEW MORE ON : Data Breach Incident Management and Recovery
  • Google Chrome warns of deceptive software downloads

    Google is to update its Chrome browser to warn users about deceptive software downloads

  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • USB-connected devices present cyber vulnerabilities

    Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers

  • Google to favour secure websites in search rankings

    Google is starting to favour secure websites and is ranking them higher on its search engine

  • Survey finds 53% of consumers will not use mobile banking

    A report by Intercede has found that 53% of consumers would not use mobile banking services because of concerns about device security

  • Redfern deploys Splunk to comply with Information Assurance

    Travel management company Redfern has deployed Splunk for proactive monitoring

  • Automating Information Governance - assuring compliance

    In the past twelve months, the impact of data leaks and security breaches, most especially the Edward Snowdon activities, has brought the security and privacy elements of information governance strongly into play. Metadata has become an issue for front-page news, and heads-of-state discuss individuals’ rights to data privacy and information deletion. Meanwhile, massive data leaks of personal information have damaged corporate reputations and hardened already strong views in some jurisdictions. We therefore need to work harder to protect live content and preserve content records, but the volume, velocity and variety of content generation makes it nearly impossible to manually maintain and enforce the policies we so earnestly set. In this report we take an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

  • Global Risks 2014

    Cybercrime and government surveillance pose a risk to the internet comparable in a scale comparable to the 2008 financial melt-down, the World Economic Forum warns in this analysis of the risks facing business and governments in 2014. The report assesses the impact of cybercrime and government surveillance on the public’s trust in the internet, and warns that the potential fragmentation of the internet could have a serious impact on the global economy. The World Economic Forum’s Global Risks 2014 report identifies cyberattack as one of the most likely global risks in 2014 and the breakdown of critical information infrastructure as among the global risks likely to have the most impact. The report analyses 31 global risks and includes a special in-depth investigation into digital disintegration. Other risks of significant concern include income disparity, extreme weather events, unemployment and fiscal crises.

  • How to start, refine and improve your social media business strategy

    Whether it’s Facebook, Twitter or LinkedIn, businesses are now expected to have a social media presence. But if you haven’t made a start or you’re dabbling without a proper strategy, then it’s easy to feel overwhelmed. How does it work? How much of my time will it take? When will I see the benefit? What do I do to get heard? This extract from Adam Gray’s book, Brilliant Social Media will help you get started straightway, then refine and improve your strategy to get real business results. Social media is easy when you know how.

  • VIEW MORE ON : Web Application Security
  • OpenStack market size will cross $1.7bn by 2016, says 451 Research

    Free and open-source cloud computing platform OpenStack could reach an estimated market size of $1.7bn by 2016

  • Poland’s financial services sector weighs cloud’s risks and rewards

    Banks and financial services enterprises in Poland are split between strict regulations and security concerns, and cloud’s benefits

  • What ingredients go into the successful app store?

    An enterprise app store should provide the controlled availability of apps for employees.We look at what is available for organisations to use

  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • Only one in 100 cloud providers meet latest EU data protection requirements

    Majority of cloud providers are not yet prepared to meet the requirements of the new EU data protection regulation

  • US Airforce Association Cyber Patriot programme comes to UK

    Northrop Grumman teams up with Cyber Security Challenge UK to bring US Air Force Association education challenge to UK

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • Global Risks 2014

    Cybercrime and government surveillance pose a risk to the internet comparable in a scale comparable to the 2008 financial melt-down, the World Economic Forum warns in this analysis of the risks facing business and governments in 2014. The report assesses the impact of cybercrime and government surveillance on the public’s trust in the internet, and warns that the potential fragmentation of the internet could have a serious impact on the global economy. The World Economic Forum’s Global Risks 2014 report identifies cyberattack as one of the most likely global risks in 2014 and the breakdown of critical information infrastructure as among the global risks likely to have the most impact. The report analyses 31 global risks and includes a special in-depth investigation into digital disintegration. Other risks of significant concern include income disparity, extreme weather events, unemployment and fiscal crises.

  • NSA insiders reveal what went wrong

    In this memo to President Obama, dated January 2013, former employees of the US electronic intelligence agency explain how NSA leaders allegedly failed in their intelligence collection and analysis before 9/11, covered up the mistakes, violated the US constitution, wasted billions of dollars on technology and mislead the public.

  • Russian hackers steal over a billion usernames and passwords

    A group of Russian cyber criminals have attacked 500 million email addresses and gained 1.2 billion usernames and passwords

  • VIEW MORE ON : Cloud security
  • HP Autonomy: Sushovan Hussain responds with HP cover-up

    Sushovan Hussain, the former CFO of Autonomy, has responded to HP "fraud" claims, alleging mismanagement of the 2011 bungled acquisition

  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • Only one in 100 cloud providers meet latest EU data protection requirements

    Majority of cloud providers are not yet prepared to meet the requirements of the new EU data protection regulation

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • Forrester: Build an app store into your corporate mobility strategy

    Corporate internal app stores can distribute the tools staff need, but they can also control who uses what and shore up data security

  • Redfern deploys Splunk to comply with Information Assurance

    Travel management company Redfern has deployed Splunk for proactive monitoring

  • Global Risks 2014

    Cybercrime and government surveillance pose a risk to the internet comparable in a scale comparable to the 2008 financial melt-down, the World Economic Forum warns in this analysis of the risks facing business and governments in 2014. The report assesses the impact of cybercrime and government surveillance on the public’s trust in the internet, and warns that the potential fragmentation of the internet could have a serious impact on the global economy. The World Economic Forum’s Global Risks 2014 report identifies cyberattack as one of the most likely global risks in 2014 and the breakdown of critical information infrastructure as among the global risks likely to have the most impact. The report analyses 31 global risks and includes a special in-depth investigation into digital disintegration. Other risks of significant concern include income disparity, extreme weather events, unemployment and fiscal crises.

  • Can BlackBerry remain in the mobile enterprise?

    BlackBerry is ramping up its drive to remain relevant following recent moves by IBM and Microsoft to target the mobile enterprise

  • O2 launches 4G tariffs for public and third-sector bodies

    O2 says new ‘No. 10’ service for public and third-sector organisations cements its commitment to customer value

  • Legal briefing: The Draft EU General Data Protection Regulation

    On October 25, 2013, the European Council concluded that the new Data Protection Framework should be adopted in a timely manner in order to strengthen consumer and business trust in Europe’s digital economy.The Council did, however, refuse to commit to adoption by early next year. This conclusion follows on the heels of the European Parliament’s Civil Liberties, Justice and Home Affairs (LIBE) Committee vote setting out its position on a compromise text of the draft Regulation on October 21, 2013. After some 18 months of intense discussions and lobbying, the compromise text was passed by the LIBE Committee with a 49-3 majority. The compromise text was heavily influenced by the revelations of the surveillance activities of the U.S. National Security Agency (NSA). This report from Morrison & Foerster, sets out some of the most important changes for private sector organizations proposed by the LIBE Committee.

  • VIEW MORE ON : Compliance Regulation and Standard Requirements
  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • USB-connected devices present cyber vulnerabilities

    Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers

  • Forrester: Build an app store into your corporate mobility strategy

    Corporate internal app stores can distribute the tools staff need, but they can also control who uses what and shore up data security

  • Automating Information Governance - assuring compliance

    In the past twelve months, the impact of data leaks and security breaches, most especially the Edward Snowdon activities, has brought the security and privacy elements of information governance strongly into play. Metadata has become an issue for front-page news, and heads-of-state discuss individuals’ rights to data privacy and information deletion. Meanwhile, massive data leaks of personal information have damaged corporate reputations and hardened already strong views in some jurisdictions. We therefore need to work harder to protect live content and preserve content records, but the volume, velocity and variety of content generation makes it nearly impossible to manually maintain and enforce the policies we so earnestly set. In this report we take an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

  • Global Risks 2014

    Cybercrime and government surveillance pose a risk to the internet comparable in a scale comparable to the 2008 financial melt-down, the World Economic Forum warns in this analysis of the risks facing business and governments in 2014. The report assesses the impact of cybercrime and government surveillance on the public’s trust in the internet, and warns that the potential fragmentation of the internet could have a serious impact on the global economy. The World Economic Forum’s Global Risks 2014 report identifies cyberattack as one of the most likely global risks in 2014 and the breakdown of critical information infrastructure as among the global risks likely to have the most impact. The report analyses 31 global risks and includes a special in-depth investigation into digital disintegration. Other risks of significant concern include income disparity, extreme weather events, unemployment and fiscal crises.

  • NSA insiders reveal what went wrong

    In this memo to President Obama, dated January 2013, former employees of the US electronic intelligence agency explain how NSA leaders allegedly failed in their intelligence collection and analysis before 9/11, covered up the mistakes, violated the US constitution, wasted billions of dollars on technology and mislead the public.

  • Russian hackers steal over a billion usernames and passwords

    A group of Russian cyber criminals have attacked 500 million email addresses and gained 1.2 billion usernames and passwords

  • Malware incidents make up 25% of CERT-UK's work in first 100 days

    Over half the incidents reported to CERT-UK in the first three months of its operation were not related to critical national infrastructure

  • Access "The future of digital forensics"

    This article in our Royal Holloway Information Security series looks at the challenges investigators face when tackling the complexities of full disk encryption.

  • VIEW MORE ON : Secure Coding and Application Programming
  • What ingredients go into the successful app store?

    An enterprise app store should provide the controlled availability of apps for employees.We look at what is available for organisations to use

  • Network upgrade levels the playing field for Infiniti Red Bull Racing

    Formula One team Infiniti Red Bull Racing uses AT&T network and UC services to stay in the running after big changes to sporting regulations

  • National Crime Agency calls for public to update security software

    The National Crime Agency (NCA) is launching a campaign to make people aware of the dangers of being online without security software

  • US Airforce Association Cyber Patriot programme comes to UK

    Northrop Grumman teams up with Cyber Security Challenge UK to bring US Air Force Association education challenge to UK

  • Android banking apps susceptible to hacking

    A vulnerability in Android applications built on the Apache Cordova platform has sparked new fears over mobile banking

  • USB-connected devices present cyber vulnerabilities

    Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers

  • Google to favour secure websites in search rankings

    Google is starting to favour secure websites and is ranking them higher on its search engine

  • Survey finds 53% of consumers will not use mobile banking

    A report by Intercede has found that 53% of consumers would not use mobile banking services because of concerns about device security

  • Automating Information Governance - assuring compliance

    In the past twelve months, the impact of data leaks and security breaches, most especially the Edward Snowdon activities, has brought the security and privacy elements of information governance strongly into play. Metadata has become an issue for front-page news, and heads-of-state discuss individuals’ rights to data privacy and information deletion. Meanwhile, massive data leaks of personal information have damaged corporate reputations and hardened already strong views in some jurisdictions. We therefore need to work harder to protect live content and preserve content records, but the volume, velocity and variety of content generation makes it nearly impossible to manually maintain and enforce the policies we so earnestly set. In this report we take an in-depth look at information governance policies, privacy and records management issues, policy enforcement, and how well technology can set or correct metadata, detect security risks, and enforce deletion policies.

  • Bringing System Management to Messaging & Collaboration

    The fast growing interaction between email, collaborative environments and social media usage on both fixed and mobile devices is putting pressure on the corporate management of these activities. Inability to manage this surge may result in inefficiencies, security issues and damage to corporate credibility. General system management tools lack the detailed ability to seamlessly monitor, manage, plan and update core business messaging and collaboration environments, notably Microsoft Exchange and SharePoint environments. This paper from analyst group Quocirca offers some answers.

  • VIEW MORE ON : Endpoint and NAC Protection