News
Hackers and cybercrime prevention
-
October 15, 2013
15
Oct'13
The ICO issues BYOD warning after breach
The ICO is calling on organisations to ensure data protection policies reflect how employees are using personal devices for work
-
October 15, 2013
15
Oct'13
UK businesses call for support to close virtual security skills gap
Most UK businesses want to see virtual security guidelines put in place to help organisations understand best practice
-
October 15, 2013
15
Oct'13
D-Link begins fixing router backdoor
D-Link has begun releasing security patches to close the backdoor discovered on some of its routers
-
October 15, 2013
15
Oct'13
BT, GCHQ and NCA set challenge to find UK cyber defenders
BT, GCHQ and the National Crime Agency (NCA) join forces to test finalists in this year's Cyber Security Challenge UK
-
October 14, 2013
14
Oct'13
McAfee exposes scope of digitally funded crime extends to contract killings
Virtual currencies are being used for a very wide range of crime – including contract killings – says a report by security firm McAfee
-
October 14, 2013
14
Oct'13
Upfront security better and cheaper, says expert
Businesses can increase data protection and decrease cost by baking in information security from the start of any IT project
-
October 11, 2013
11
Oct'13
Skype under investigation over link to NSA
Skype is under investigation by Luxembourg's data protection authorities over links with the NSA's Prism surveillance programme
-
October 11, 2013
11
Oct'13
Richard Horne joins PwC’s cyber practice
Richard Horne, former managing director of cyber security at Barclays Bank, is joining PwC's cyber security practice
-
October 11, 2013
11
Oct'13
NCA notches up first phishing conviction
The National Crime Agency (NCA) Cyber Crime Unit has notched up its first conviction of a phishing offender after an investigation
-
October 11, 2013
11
Oct'13
Legitimate users of Tor need not worry, says NCA
The National Crime Agency (NCA) says criminals cannot hide on the internet, but legitimate business users of anonymity software Tor are safe
-
October 10, 2013
10
Oct'13
Google to reward open source security fixes
Google has announced plans to reward developers for proactive security improvements for select open source projects
-
October 10, 2013
10
Oct'13
Blackhole and Cool exploit kit suspect arrested
Russian police have arrested a man suspected of creating the Blackhole and Cool exploit kits
-
October 09, 2013
09
Oct'13
UK security researcher first to win top Microsoft bounty
A UK security researcher is the first to win $100,000 in one of three new Microsoft bug bounty programmes
-
October 09, 2013
09
Oct'13
NCA investigates “deep web” after UK Silk Road arrests
The UK National Crime Agency is investigating hidden internet operations after UK Silk Road arrests
-
October 09, 2013
09
Oct'13
Pro-Palestinian hacktivists hit security sites
Pro-Palestinian hacktivists have attacked the websites of two IT security firms and a mobile messaging service
-
October 08, 2013
08
Oct'13
Cyber crimes costs UK businesses average of £3m per year
Cyber crime costs UK organisations around £3m a year on average a study has revealed
-
October 08, 2013
08
Oct'13
FireEye discovers rapidly growing class of mobile threats
FireEye researchers have discovered a rapidly growing class of mobile threats affecting at least 200 million users
-
October 08, 2013
08
Oct'13
Microsoft pays out $128K to security bug hunters
Microsoft has paid out more than $128,000 since introducing bug bounty programmes in June
-
October 08, 2013
08
Oct'13
Major gaps in enterprise insider threat detection, study shows
There are major gaps in the ability of large enterprises to detect and address insider threats, a study shows
-
October 07, 2013
07
Oct'13
UK National Cyber Crime Unit becomes operational
The UK's National Cyber Crime Unit has become operational as part of the new National Crime Agency
-
October 07, 2013
07
Oct'13
RSA Europe 2013 to get practical about big data
Big data is to dominate the agenda at the RSA Europe Conference 2013 taking place in Amsterdam from 29 – 31 October, but will be more practical than theoretical, says programme chair
-
October 07, 2013
07
Oct'13
Banks to test cyber defences
UK banks are to take part in the most extensive cyber threat exercise in two years to test their ability to survive a sustained online attack
-
October 04, 2013
04
Oct'13
Awareness training not enough, says security researcher
Cyber security awareness training of employees does not go far enough to be effective, says McAfee research director
-
October 04, 2013
04
Oct'13
McAfee Focus 2013: Digitally signed malware a fast-growing threat, say researchers
Digitally signed malware is a fast-growing threat aimed at bypassing whitelisting and sandboxing, say security researchers
-
October 04, 2013
04
Oct'13
Time to reinvent security, says Intel president
Future IT security will be not be like it has been in the past, says Renée James, president of Intel
-
October 03, 2013
03
Oct'13
World needs to understand cyber threat, say Leon Panetta
The world needs to understand that cyber threat is really about crippling attack, says former US secretary of state Leon Panetta
-
October 03, 2013
03
Oct'13
FBI shuts down Silk Road online drug market
The FBI has shut down the Silk Road online drug market and arrested kingpin Ross Ulbricht, previously known only as Dread Pirate Roberts
-
October 03, 2013
03
Oct'13
McAfee Focus 2013: APTs more dangerous than ever, says researcher
Advanced persistent threats (APTs) pose more of a threat than ever, says a researcher at Intel-owned security organisation McAfee
-
October 03, 2013
03
Oct'13
McAfee Focus 2013: Security is about enabling tech benefits, says McAfee
Information technology can benefit people only if they trust they can use it without risk, says McAfee president
-
October 02, 2013
02
Oct'13
McAfee Focus 2013: McAfee leadership upbeat about Stonesoft acquisition
Intel-owned security firm McAfee is upbeat about its acquisition of Stonesoft and its future capability to tackle security differently
-
October 02, 2013
02
Oct'13
Bank of England and Treasury set banks cyber security deadline
Directors at banks and organisations core to the financial system have six months to outline their cyber security strategies
-
October 01, 2013
01
Oct'13
Biometrics key to frictionless authentication, says BioCatch
Biometrics provides hassle-free, invisible, yet highly accurate user authentication, says Israeli startup
-
October 01, 2013
01
Oct'13
IT security industry still immature, says (ISC)2 board member
The information security industry is still immature and failing to act or speak as one, says Dave Lewis, (ISC)2 board member
-
September 30, 2013
30
Sep'13
Developing a new strategy for information security
What are the chief challenges facing information security practitioners and what are the solutions?
-
September 30, 2013
30
Sep'13
Huawei poses no competitive threat to US networking firms, says Enterasys CEO
Too few US organisations trust China government-linked Huawei for it to pose a threat to networking firms, says Enterasys’s CEO
-
September 30, 2013
30
Sep'13
‘I don’t believe privacy exists,’ claims network executive
Ipswitch executive claims European businesses more paranoid about privacy than US, where attitudes have changed since 9/11
-
September 30, 2013
30
Sep'13
MoD announces specialist programme to fend off cyber attacks
The Ministry of Defence (MoD) has announced a strategy to defend UK national security from the threat of cyber attacks
-
September 27, 2013
27
Sep'13
Cyber attack retaliation a bad idea, says international panel
Retaliatory cyber attacks are not a good idea, an international panel has told a joint security practitioners conference in Chicago
-
September 27, 2013
27
Sep'13
Financial markets next big cyber target, says US expert
Manipulation of international financial markets will be the next evolution of cyber crime, says US Cyber Consequences Unit chief
-
September 27, 2013
27
Sep'13
Continuous monitoring has great promise, says IA specialist
Continuous monitoring is fast becoming a security buzzword, but it is a way for security professionals to regain lost ground, says IA specialist
-
September 27, 2013
27
Sep'13
Metropolitan Police cybercrime team claims £1bn savings
The Metropolitan Police claims its Police Central e-Crime Unit (PCeU) has saved over £1bn in the past two and a half years
-
September 27, 2013
27
Sep'13
Ex-hackers best qualified to improve cyber security say 70% of IT firms
Over half of businesses are not taking IT security seriously enough and almost three quarters of IT professionals think ex-hackers could be the right people to help businesses improve cyber-security.
-
September 27, 2013
27
Sep'13
Top 10 cyber crime stories of 2013
Cyber crime featured heavily in security news coverage in 2013, with cyber criminals and cyber law enforcers upping their games with each passing month
-
September 27, 2013
27
Sep'13
Software acquisition is risk acquisition, says industry panel
New software often means new security vulnerabilities, panel tells the (ISC)2 Security Congress 2013
-
September 26, 2013
26
Sep'13
Education and skills key to cyber security, says (ISC)2
Information security professionals are making progress, but they are still losing the race, says (ISC)2 head
-
September 26, 2013
26
Sep'13
Time for a new security paradigm, says ex-military CIO
Security is constantly changing, which means security professionals need to be proactive, says a former US military CIO
-
September 25, 2013
25
Sep'13
Enterprise security increasingly challenging, study finds
Enterprise IT security executives are facing broad, complex and sometimes conflicting security challenges, an (ISC)² study has revealed
-
September 25, 2013
25
Sep'13
Pen tests must effect cultural change, says security veteran
Penetration tests are worthless unless they can be used to show how to mitigate potential damage of cyber attacks, says security expert Ira Winkler
-
September 25, 2013
25
Sep'13
Shadow Home Secretary calls for IT talent to join police
Shadow Home Secretary Yvette Cooper has outlined Labour plans to attract the brightest technology brains into policing
-
September 25, 2013
25
Sep'13
Europe threatens to pull out of US data-sharing deal over NSA surveillance claims
European Parliament threatens to pull out of deal to allows US authorities access to European payment networks for tracking terrorist funding
-
September 25, 2013
25
Sep'13
Secure cloud adoption is all about risk, says industry panel
Always take a risk-based approach to cloud adoption, a panel has told security professionals at the (ISC)2 Security Congress 2013 in Chicago
-
September 25, 2013
25
Sep'13
Cyber attacks to escalate over next decade
Medical implants, cars and critical infrastructure could be at risk from cyber attacks by the end of the decade, study claims
-
September 25, 2013
25
Sep'13
Anti-phishing vital in Scada protection, says expert
A high proportion of cyber attacks, including those against Scada control systems, are enabled by phishing attacks.
-
September 20, 2013
20
Sep'13
Cyber bank robberies a warning for business, say experts
Barclays has joined Santander in being targeted by criminals who took control of bank computers using inexpensive kit
-
September 20, 2013
20
Sep'13
FireEye announces pricing of IPO
Security firm FireEye has announced the pricing of its initial public offering of 15.2 million at $20 a share
-
September 20, 2013
20
Sep'13
Data analytics at MoD could save money and lives, says report
Applying big data analytics at the MoD could save money and lives, says a report by the Royal United Services Institute
-
September 20, 2013
20
Sep'13
RSA vetoes NSA-linked encryption algorithm
RSA advises customers to stop using the encryption algorithm leaked documents suggest contains a back door placed by the NSA
-
September 19, 2013
19
Sep'13
Microsoft releases emergency fix for IE zero day
Microsoft has released a fix for the latest zero-day flaw in IE, but IT administrators must still be vigilant after patch is released, say experts
-
September 18, 2013
18
Sep'13
Context is key to security as IT loses control, says Gartner
IT is losing control of devices and systems, but security can be achieved through context, says Gartner
-
September 18, 2013
18
Sep'13
Time for a security and risk reset, says Gartner
It is time to kick security and risk evolution into high gear, says Gartner vice-president and distinguished analyst Paul Proctor
-
September 17, 2013
17
Sep'13
Proportionality key to cyber surveillance, says former MI5 head
Proportionality is critical in cyber surveillance by intelligence services, says former MI5 head Eliza Manningham-Buller
-
September 17, 2013
17
Sep'13
Mobile security “a tidal wave” of challenges, says security expert
“Expect more trouble,” a mobile security expert has told the 2013 EuroCACS security and risk management conference in London
-
September 16, 2013
16
Sep'13
ICO denies bias against public sector organisations
The ICO has denied a bias in imposing civil monetary penalties against public sector organisations
-
September 16, 2013
16
Sep'13
Risk assessment key to cloud adoption, says Isaca
There is mass confusion among small and medium businesses about cloud computing, says Amar Singh, chair of Isaca UK
-
September 13, 2013
13
Sep'13
Will the iPhone 5S’s fingerprint technology help enterprise security?
A fingerprint sensor has been built into Apple's latest iPhones. Computer Weekly looks at what this means for enterprise security
-
September 13, 2013
13
Sep'13
Police foil bespoke cyber theft at Santander
London police have arrested 12 men in connection with a foiled attempt to steal millions of pounds from Santander
-
September 12, 2013
12
Sep'13
Wick Hill and Guidance Software partner to help UK businesses with security
Value-added distributor Wick Hill and security firm Guidance Software have joined forces to help UK business address cyber threats
-
September 11, 2013
11
Sep'13
GCHQ launches recruitment challenge
Government communications intelligence agency GCHQ has launched an online code-cracking competition with the aim of finding talented recruits
-
September 11, 2013
11
Sep'13
Security Think Tank: Embrace consumer cloud storage at your peril
How can businesses make use of free or low-cost cloud storage services aimed at consumers, but ensure their data is safe and secure?
-
September 11, 2013
11
Sep'13
Apple adopts hands-off approach to iPhone fingerprint scanner
The fingerprint sensor in the newly unveiled iPhone 5S could mean the end of passwords, but Apple is keeping developers at arm’s length
-
September 09, 2013
09
Sep'13
Most websites could be targeted through PHP, warns Imperva
Hackers are focusing on vulnerabilities in PHP web application development platform, threatening most websites, warns Imperva
-
September 06, 2013
06
Sep'13
NSA and GCHQ unlock online privacy encryption
UK and US intelligence agencies have unlocked the technology used to encrypt online services, including email, online banking and medical records.
-
September 04, 2013
04
Sep'13
Over half IT pros believe business is losing cyber battle
Business is losing the battle against state-sponsored cyber attacks according to a survey of senior IT security professionals
-
September 03, 2013
03
Sep'13
Disinfecting PCs false security, says security expert
Many companies proud of their ability to identify and clean malware infected machines are missing a trick, says veteran security expert
-
September 03, 2013
03
Sep'13
IT security critically underfinanced, study finds
IT security is critically underfinanced by business, a global study has revealed
-
September 02, 2013
02
Sep'13
Eight new finalists in Cyber Security Challenge UK
Eight Cyber Security Challenge UK finalists announced at the UK’s first civilian cyber security training camps
-
September 02, 2013
02
Sep'13
Public sector ignoring secure by default approach
The public sector is risking security breaches by ignoring the principle of secure by default, a study has shown
-
September 02, 2013
02
Sep'13
UK business data theft at record high
Data theft from UK companies by employees is at a record high, according to law firm EMW
-
September 02, 2013
02
Sep'13
Snowden docs show broad and aggressive US cyber intrusions
US intelligence services conducted 231 offensive cyber operations in 2011, the latest leaked documents from whistleblower Edward Snowden reveal
-
August 30, 2013
30
Aug'13
NYT hactivist attack shows need for registry locking
Syrian hacktivist attack on New York Times website highlights the need for registry locking, says communications and analysis firm Neustar
-
August 29, 2013
29
Aug'13
Vishing costs UK £7m a year
Fraud committed using personal details obtained by voice email, voice over IP, landline and mobile calls is costing UK citizens at least £7m a year
-
August 29, 2013
29
Aug'13
Dropbox can be hacked, say security researchers
Security researchers say they bypassed the security of cloud-based storage service Dropbox and gained access to private user files
-
August 28, 2013
28
Aug'13
Cyber protection must shield targeted apps, says Trusteer
Cyber threat protection must shield targeted end-user applications, says security firm Trusteer
-
August 28, 2013
28
Aug'13
Syrian hacktivists down New York Times website
The New York Times believed to have been targeted by a hacktivist group that supports Syrian president Bashar al-Assad
-
August 28, 2013
28
Aug'13
Financial services watchdog announces mobile banking report
FCA outlines the thematic work it is carrying out to better understand opportunities and risks associated with mobile banking
-
August 27, 2013
27
Aug'13
Many firms vulnerable to Java 6 flaw, warns Qualys
Many firms are at risk of cyber attacks exploiting an unpatched security flaw in Java 6, warns security firm Qualys
-
August 27, 2013
27
Aug'13
Government leaders lack tech knowledge, says US cyber expert
Many government leaders are not informed and familiar with technology, says director and chief economist at the US Cyber Consequences Unit
-
August 27, 2013
27
Aug'13
Security must be part of digital reform, says Thales
The arrest of a man believed to have collected more than £100,000 in fraudulent UK tax rebates shows that security must be part of digital reform, says security firm Thales
-
August 27, 2013
27
Aug'13
Five cyber attackers arrested over UK tax fraud
Five men have been arrested in connection with an HMRC investigation into cyber attackers suspected of identity theft and tax fraud
-
August 23, 2013
23
Aug'13
Box.com forges new cloud security model
Service providers and consumers need to move to a security model better suited to the cloud computing, says Box.com
-
August 23, 2013
23
Aug'13
Nasdaq shutdown raises security fears
A software glitch that caused the Nasdaq stock exchange to shut down raises fears over stock market stability and cyber attacks
-
August 22, 2013
22
Aug'13
Security Think Tank: 3 keys to effective cyber security
The rapid rise in cyber espionage highlights the need to rethink data security strategies to improve protection of intellectual property. But what is the best way of doing that?
-
August 22, 2013
22
Aug'13
Charlie McMurdie joins PwC’s cyber practice
Charlie McMurdie, former head of the Metro Police central e-crime unit, is joining business consultancy firm PwC as its senior crime adviser
-
August 21, 2013
21
Aug'13
How to build a risk threat model
Experts at Rapid 7’s United security summit share advice on building a risk threat model to get the resources you need
-
August 21, 2013
21
Aug'13
Case study: Keeping it private at Beth Israel Deaconess after the Boston Marathon Attacks
Doctor and healthcare CIO shares his lessons learned from the Boston Marathon attacks and how to protect patient data
-
August 21, 2013
21
Aug'13
Android mobile malware rebounds in Q2, reports McAfee
Android-based malware has grown 35% in the second quarter, according to the latest threat report from security firm McAfee
-
August 21, 2013
21
Aug'13
United 2013 Security Summit: How to make an insane idea acceptable
Rapid7’s president and chief executive officer discusses the evolution of risk management throughout time and best practices
-
August 20, 2013
20
Aug'13
Rapid 7 summit: Attacks are personal so risk analytics need to get personal too
Delegates at Rapid 7’s United 2013 security summit heard how security needs to be personal as cyber attacks become personal
-
August 20, 2013
20
Aug'13
Rapid7 opens London office in international expansion
Security supplier Rapid7 continues to grow, with plans to expand operations in London, Hong Kong and Australia
-
August 20, 2013
20
Aug'13
Enterprise data security still possible, say industry partners
Novell, Kyocera and NetIQ have joined forces to demonstrate that reliable enterprise data security is achievable in the mobile era