News
Endpoint security
-
June 17, 2013
17
Jun'13
Startup profile: Digital Shadows
Digital Shadows is an IT security startup that analyses a company’s digital footprint on the internet. The service looks at all the information businesses expose online through social media channels, cloud services and mobile devices to find risks ...
-
June 17, 2013
17
Jun'13
Apple, Facebook and Microsoft reveal US government data requests
Technology giants Apple, Facebook and Microsoft have all revealed details of US government surveillance requests
-
June 11, 2013
11
Jun'13
Security tech market set to grow 8.7% in 2013, says Gartner
The worldwide security technology and services market will reach $67.2bn in 2013, up 8.7% from 2012, according to research firm Gartner
-
June 11, 2013
11
Jun'13
Apple unveils iOS 7
Apple has unveiled the latest version of its mobile operating system, saying iOS 7 is the most significant update since the original iPhone
-
June 10, 2013
10
Jun'13
Telefonica Digital forms security group Eleven Paths
The business division of mobile operator Telefonica launches Eleven Paths, an independent company working on security issues in the workplace
-
June 10, 2013
10
Jun'13
Zero trust model key to security success, says Forrester
The principles of network confidentiality, integrity and availability are not balanced, says John Kindervag, principal analyst at Forrester Research
-
June 10, 2013
10
Jun'13
NSA surveillance whistleblower reveals identity
Former technical assistant for the CIA, Edward Snowden, reveals his identity as the whistleblower of US surveillance programmes
-
June 05, 2013
05
Jun'13
Most businesses hit by mobile security incident, study shows
Almost 80% of businesses had a mobile security incident in the past year, in many cases incurring substantial costs, a study has shown
-
June 05, 2013
05
Jun'13
Case study: TGI Friday's goes wireless with Aruba
TGI Friday's across the UK uses wireless technology from Aruba Networks to process payments and has big plans for the future
-
June 03, 2013
03
Jun'13
Care home operator manages Apple estate with Absolute
Software firm offers the right MDM solutions for LNT Group to manage a fleet of iPhones without needing individual iTunes accounts.
-
May 30, 2013
30
May'13
Case Study: US supermarket chain solves security challenge virtually
A US supermarket chain has implemented an endpoint security system to secure legacy applications and to save additional development
-
May 21, 2013
21
May'13
Dell appoints new UK head to drive services transformation
As the company attempts to reinvent itself, Dell has a new UK head, Tim Griffin who aims to deliver a single country focus
-
May 20, 2013
20
May'13
Managing the mobile enterprise
Mobile working has brought new challenges for IT departments, but the fundamentals of managing them remain the same.
-
May 09, 2013
09
May'13
Solihull council saves time and money with BYOD
At least one in five local authorities in the UK could allow staff to use their own devices at work, due to demand from employees
-
May 07, 2013
07
May'13
Symantec helps NHS trust cut security costs by a quarter
The Royal Liverpool and Broadgreen University Hospitals NHS Trust cut security costs by 25% in its partnership with security supplier Symantec
-
May 03, 2013
03
May'13
BlackBerry 10 and Samsung Knox approved by US military
The US Department of Defense (DoD) has approved BlackBerry and Samsung mobile devices for use on its networks
-
May 01, 2013
01
May'13
LogRhythm and FireEye announce partnership
LogRhythm's next-generation security information and event management technology is to be integrated with FireEye's malware protection system
-
May 01, 2013
01
May'13
NIST revises US federal cyber security standards
The US National Institute of Standards and Technology has revised federal cyber security standards to address threats since 2005
-
May 01, 2013
01
May'13
Security Think Tank: Governance should determine strategy for BYOD
With the growth of BYOD, what measures can IT take to ensure the security of enterprise data and does MDM really have a role?
-
April 30, 2013
30
Apr'13
UK consumers fear cyber attacks on smart meters, survey reveals
UK consumers believe smart meters will capture too much personal information and will be vulnerable to cyber attack, a survey has revealed
-
April 29, 2013
29
Apr'13
McAfee warns of unpatched vulnerability in Adobe Reader
An unpatched vulnerability in every version of Adobe Reader reveals where and when a PDF document is opened, says McAfee
-
April 26, 2013
26
Apr'13
Case study: Omnicom improves security and cuts costs without disruption
The Omnicom Media Group has cut costs and reduced risk without business disruption by deploying ForeScout’s CounterACT network access control system
-
April 25, 2013
25
Apr'13
Spam SMS messages drop following ICO penalty
The number of spam SMS messages has significantly reduced since government regulator ICO issued £440,000 fines last year
-
April 24, 2013
24
Apr'13
Infosec 2013: Sophos updates free Android security app
Google’s Android mobile operating system is an increasingly popular target for malware and SMS phishing, says security company Sophos
-
April 19, 2013
19
Apr'13
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft
-
April 17, 2013
17
Apr'13
New approach blocks all zero-day malware, says Trusteer
Stateful application control blocks 100% of previously unknown malware, closing the security gap left by traditional AV software, says Trusteer
-
April 16, 2013
16
Apr'13
Mobile malware up 163% in 2012, says NQ Mobile
Mobile malware threats increased 163% to more than 65,000 in 2012, according to the latest security report from NQ Mobile
-
April 11, 2013
11
Apr'13
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations
-
April 11, 2013
11
Apr'13
Porn websites pose malware risk, says researcher
Browsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher
-
April 09, 2013
09
Apr'13
Check Point CEO Gil Shwed unveils 2013 plans
Check Point will focus on mobile data, simplifying security management, protecting branch offices and collaborative attack intelligence in 2013
-
April 04, 2013
04
Apr'13
Malware hits businesses 20 to 60 times an hour, say researchers
Advanced cyber attacks hit businesses 20 times an hour on average, say researchers at security firm FireEye
-
April 04, 2013
04
Apr'13
Researchers discover new Android Trojan
Cyber threat researchers have discovered a new Android Trojan called Stels which is designed to steal text messages
-
April 04, 2013
04
Apr'13
Fraudsters widen card-skimming operations in Europe
Criminals using card-skimming devices are targeting not just bank ATMs but transport and parking ticket machines as well, a report has revealed
-
April 03, 2013
03
Apr'13
US Army practises poor data security on mobile devices
Pentagon inspector general finds smartphones and tablets the US Army buys are not configured to protect sensitive data and allow remote wipe
-
March 22, 2013
22
Mar'13
Millions of vulnerable devices on the internet, researcher reveals
A scan of the internet by an anonymous security researcher has revealed millions of IP-enabled devices protected only by default passwords.
-
March 20, 2013
20
Mar'13
CESG denies BlackBerry 10 insecurities
CESG - the the information assurance arm of GCHQ - denies reports BlackBerry’s latest OS doesn’t pass muster when it comes to security
-
March 20, 2013
20
Mar'13
Case study: Hamilton Fraser embraces BYOD with MobileIron
How insurance firm Hamilton Fraser is using MobileIron to enable employees to bring their own devices while following company policy
-
March 20, 2013
20
Mar'13
IT security professionals break USB stick virus rules
Most IT security professionals polled at RSA Conference 2013 admitted to picking up and plugging in USB flash drives they found lying around
-
March 20, 2013
20
Mar'13
CESG says BlackBerry’s new BB10 software not secure enough
The government's technical security advisor CESG says BlackBerry's new BB10 software is not secure enough for essential work
-
March 13, 2013
13
Mar'13
CIO interview: Hervé Coureil, global CIO, Schneider Electric
A 20-year veteran at energy management firm Schneider Electric, Hervé Coureil became CIO five years ago, crossing disciplines from finance
-
March 12, 2013
12
Mar'13
UK’s million missing laptops a data time bomb, says report
The million laptops that have gone missing in past year are a business data time bomb, says Sony’s VAIO Digital Business report 2013
-
March 08, 2013
08
Mar'13
Half of all companies lose devices with important data
Recent survey shows half of all firms have lost devices with important data, with security implications for more than 20% of those businesses
-
March 07, 2013
07
Mar'13
Barclays streamlines phone banking with voice biometrics
Barclays wealth investment management has been using voice biometrics from Nuance to streamline authentication when clients call
-
March 06, 2013
06
Mar'13
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy
-
March 06, 2013
06
Mar'13
Traditional security fails against targeted attacks, says Trend Micro
Context is the most important element to defending corporate data in the face of increasingly targeted attacks, says security company Trend Micro
-
March 05, 2013
05
Mar'13
Rapid malware growth for smartphones, reports G Data
Malware is increasingly targeting smartphones and tablet PCs with an Android operating system, according to a malware study from G Data
-
February 27, 2013
27
Feb'13
350,000 different types of spam SMS messages were targeted at mobile users in 2012
350,000 different variants of unsolicited spam SMS messages were accounted for in 2012, with 53,000 variants logged for December alone
-
February 27, 2013
27
Feb'13
Health records should be protected like bank details, says BCS
The BCS and NHS say people should protect their online medical records in the same way they look after their bank details
-
February 26, 2013
26
Feb'13
RSA 2013: Cyber security skills shortage needs urgent attention, says DoHS
The lack of people with cyber security skills requires urgent attention, says Mark Weatherford, deputy under-secretary for cybersecurity at the US Department of Homeland Security (DoHS).
-
February 26, 2013
26
Feb'13
RSA 2013: Big data could help or hinder business, says RSA
Big data has the potential to transform businesses through the ability to extract meaning, but it will also increase exposure to cyber attack
-
February 25, 2013
25
Feb'13
Samsung launches SAFE with Knox for mobile devices enterprise security
Samsung has unveiled software which enables a secure work profile to run on a Samsung mobile device
-
February 22, 2013
22
Feb'13
Financial attacks migrate to other sectors, McAfee finds
Cyber attacks originally crafted to target the financial services industry are migrating to other sectors, says security firm McAfee.
-
February 21, 2013
21
Feb'13
Over half of botnet control centres in the US, says Check Point
The command and control centres (C&C) for more than half of the world’s botnets are in the US, not China, says security firm CheckPoint
-
February 21, 2013
21
Feb'13
Apple releases security update for Mac OS X following Java malware attack
Apple releases a security update for its Mac OS X to protect against malware used to attack the company’s computer systems
-
February 20, 2013
20
Feb'13
VMware updates Horizon with workplace bundle
VMware has updated its Horizon View and VMware Horizon Mirage tools and introduced Horizon Workspace to support secure VDI and mobile access
-
February 20, 2013
20
Feb'13
The lawyer, the supplier and the consultant on outsourcing security
A global survey that revealed 63% of security breaches are linked to third-party services highlights need to prioritise security when outsourcing
-
February 19, 2013
19
Feb'13
McAfee warns of NFC threat to mobiles
As near field communications (NFC) becomes a more popular feature on mobile phones, more attacks based on the technology will arise
-
February 18, 2013
18
Feb'13
BAE Systems and Vodafone join forces for mobile security
The aerospace and defence company BAE Systems will work with Vodafone to offer security products for mobiles and tablets
-
February 15, 2013
15
Feb'13
iOS 6.1 security flaw allows iPhone lock screen bypass
Apple may have to release another fix for its recently released operating system update iOS 6.1 to protect against thieves and hackers
-
February 12, 2013
12
Feb'13
IT industry group releases password-killing standard
A consortium of IT companies, including PayPal and Lenovo, publishes new set of standards that could rid users of usernames and passwords
-
February 11, 2013
11
Feb'13
Apple seeks to improve iOS security with image recognition
Apple is planning to improve the security of iOS on iPhones and iPads by using image recognition or response, according to a patent application
-
January 31, 2013
31
Jan'13
Blending work and personal life increasing security risks, warns global report
Cisco finds next generations of mobile workers increase the security challenges facing CIOs because they mix work and private lives
-
January 29, 2013
29
Jan'13
Data protection tops 2013 UK security priorities
Data protection is the top security priority for more than half of UK organisations in 2013, a survey has revealed
-
January 29, 2013
29
Jan'13
Motion sensors could unlock smartphones, say researchers
Smartphone motion sensors could prove a security vulnerability in helping criminals work out locking codes, say US security researchers
-
January 16, 2013
16
Jan'13
Cloud security key to BYOD, (ISC)2 study shows
(ISC)2 says businesses welcome bring your own device (BYOD) policies for cost savings and user experience, but need the right security skills
-
January 16, 2013
16
Jan'13
Huge botnet infecting smartphones in China
Security researchers say a huge botnet is running on the smartphones of more than a million mobiles in China
-
January 02, 2013
02
Jan'13
Microsoft issues quick fix for IE zero-day vulnerability
Microsoft has released a workaround for a zero-day vulnerability in older versions of its Internet Explorer browser that is being exploited by attackers.
-
December 27, 2012
27
Dec'12
Top 10 personal computing articles of 2012
The year 2012 will go down in history as the year when people voted with their wallets and decided that tablets are good enough for work.
-
December 07, 2012
07
Dec'12
Antivirus systems fail to detect unknown viruses, study shows
Less than 5% of the top 40 antivirus systems are able to detect previously non-cataloged viruses initially, a study has revealed
-
December 05, 2012
05
Dec'12
Computer Weekly European User Awards Criteria and Information
Read the entry criteria and general information about entering the Computer Weekly European User Awards.
-
November 28, 2012
28
Nov'12
Ovum urges CIOs review MDM policies to support BYOD practices
IT departments must review IT support contracts and invest in mobile device management (MDM) for staff using their own devices at work
-
November 21, 2012
21
Nov'12
India tops rankings of countries opposed to BYOD
Nearly half of all Indian companies have security policies prohibiting staff using their own mobile devices for work, an ISACA survey reveals
-
November 19, 2012
19
Nov'12
Cyber criminals target Skype, Facebook and Windows users
Cyber criminals targeted users of Skype, Facebook and Windows using multiple Blackhole exploits in October, according to security firm GFI Software
-
November 16, 2012
16
Nov'12
Nasa to encrypt data after latest breach
Nasa is to encrypt all its mobile computers after the loss of a laptop containing personal information about more than 10,000 staff
-
November 15, 2012
15
Nov'12
Cyber security will change ideas of the nation state, says Stonesoft
The lack of cyber security is a major threat to the civilised world and will change how people see the nation state, says security firm Stonesoft
-
November 14, 2012
14
Nov'12
IT professionals too trusting of Generation Y
While most IT managers think employees stick to policy, most 18- to 30-year-olds play by their own rules, using personal devices at work
-
November 14, 2012
14
Nov'12
Operation High Roller fraud puts US finance companies on red alert
Fraud ring Operation High Roller has spread from Europe to countries including the US in recent months, says McAfee’s latest threat report
-
November 13, 2012
13
Nov'12
Many UK firms underestimate cost of data breaches, study finds
Many UK organisations are still failing to understand the implications and costs of data breaches, a study has revealed
-
November 12, 2012
12
Nov'12
Millions worldwide use insecure browsers, says Kaspersky
Nearly a quarter of all internet users worldwide are running outdated browsers, creating huge gaps in online security, says Kaspersky
-
November 09, 2012
09
Nov'12
BYOD devices to double by 2014
The number of consumer devices brought into the workplace will hit 350 million by 2014, according to a study from Juniper Research
-
November 09, 2012
09
Nov'12
BlackBerry 10 approved for US government
RIM's yet-to-be-launched BlackBerry 10 platform has been awarded the US government’s security certification
-
November 07, 2012
07
Nov'12
Dogs to have their day in mobile security campaign
The UK Cyber Security Challenge has announced the winner of its Can You Talk Security? competition devised by BT and Get Safe Online
-
November 05, 2012
05
Nov'12
Firms remain in denial about cyber attacks, says Guidance Software
If cyber attackers want to get into an organisation’s information systems they will find a way, says e-discovery firm Guidance Software
-
October 31, 2012
31
Oct'12
Apple squashes BlackBerry as Brent Borough deploys iPads
Brent Borough Council replaces BlackBerry and deploys MobileIron to securely manage almost 3,000 iPads and iPhones
-
October 31, 2012
31
Oct'12
Free mobile apps a threat to privacy, study finds
Free mobile apps pose a serious threat to privacy because of their ability to capture large amounts of user information
-
October 31, 2012
31
Oct'12
Security data exchange: if McAfee builds it, will they come?
McAfee has announced its Security Connected Plaform for security data exchange, but will other suppliers come to the party?
-
October 30, 2012
30
Oct'12
IT security budgets mismatched to hacker targets, study shows
IT security budgets are not being used to provide defence technologies in some areas most likely to be targeted by hackers, a study shows
-
October 30, 2012
30
Oct'12
Cyber defences of SMEs lag behind larger firms, study confirms
SMEs suffer more from malware than larger organisations, but their security procedures are inferior, says security firm, Kaspersky Lab
-
October 26, 2012
26
Oct'12
CESG certification for Information Assurance and cyber security unveiled
The CESG launches scheme to benchmark Information Assurance and cyber security professionals
-
October 24, 2012
24
Oct'12
McAfee Focus 2012: McAfee to help secure nuclear plants
Westinghouse Electric Company and McAfee have announced a partnership around information security for nuclear power plants
-
October 24, 2012
24
Oct'12
McAfee Focus 2012: One fifth of corporate network devices unknown
At least 20% of the devices on corporate networks are not known to the organisation, says security company McAfee
-
October 24, 2012
24
Oct'12
McAfee Focus 2012: Xerox, McAfee partner on embedded security threat
Only around 13% of organisations are aware that printers and multi-function devices represent a threat to information security, says Xerox
-
October 24, 2012
24
Oct'12
McAfee Focus 2012: Endpoint security key to Security Connected strategy
Security firm McAfee has announced four enhancements of endpoint security as part of its Security Connected strategy at McAfee Focus 2012
-
October 24, 2012
24
Oct'12
BYOD creating security risks for 80% of companies
Businesses are opening themselves up to security threats by failing to manage bring-your-own-device (BYOD) programmes properly
-
October 22, 2012
22
Oct'12
Attackers besiege Google Android OS, Trend Micro reveals
Google’s Android mobile OS is under siege by attackers, as malware and data-stealing adware rose 483% in the last quarter, says Trend Micro
-
October 22, 2012
22
Oct'12
Windows 8 security: how does it measure up?
Microsoft's Windows 8 is seen by many as representing an evolutionary jump for the operating system, but what about security?
-
October 19, 2012
19
Oct'12
Lost devices access work email, says Sophos
A fifth of lost electronic devices have access to work email, exposing confidential corporate data, a survey from Sophos has revealed
-
October 16, 2012
16
Oct'12
Security remains a barrier to mobility, study finds
Security, potential loss of data and compliance remain key concerns in using mobile enterprise apps, a study has revealed
-
October 15, 2012
15
Oct'12
Austrian hospital improves access to patient data with Imprivata
Klinikum Wels-Grieskirchen hospital in Austria explains how it improved speed of access and security to its works stations.
-
October 11, 2012
11
Oct'12
RSA Europe: Security must take human factor into account
Security needs to start taking into account the differences in users, says Hugh Thompson, RSA Conference programme committee chair