News
Hackers and cybercrime prevention
-
March 19, 2015
19
Mar'15
Target agrees to $10m breach compensation
US retailer Target has agreed to a $10m compensation package for victims of its 2013 data breach
-
March 18, 2015
18
Mar'15
Premera hack exposes 11 million financial and medical records
US health insurance firm Premera Blue Cross reveals an IT systems breach, exposing financial and medical records of 11 million customers
-
March 17, 2015
17
Mar'15
Microsoft warns of fake SSL certificate for Windows Live
Microsoft has warned that a fake security certificate has been issued for the Windows Live domain that could be abused by attackers
-
March 13, 2015
13
Mar'15
Lookout bets on big data analytics to secure enterprise mobiles
Mobile security SaaS provider Lookout is betting on its cloud-based big data analytics capability to attract enterprise customers
-
March 13, 2015
13
Mar'15
Japan recruits hackers for cyber security force
The Japanese government plans to recruit hackers to identify and protect against cyber security threats
-
March 11, 2015
11
Mar'15
Why IAM is topping security investments in 2015
It is not surprising identity and access management (IAM) is set to move to the fore in 2015
-
March 09, 2015
09
Mar'15
US cyber crime indictment prompts calls for zero tolerance
A newly-revealed US indictment of three suspected cyber criminals has prompted a call for zero tolerance for cyber intrusions
-
March 09, 2015
09
Mar'15
Group claiming links to Isis hacks small business websites
The FBI is investigating the hacking of a number of SME websites in the US and Europe by people claiming affiliation with Islamic State
-
March 09, 2015
09
Mar'15
2015 IT priorities: SDN yet to prove itself, fear of network hacks growing
In Computer Weekly’s 2015 IT priorities study, software-defined networking is still behind management and monitoring as a networking priority
-
March 06, 2015
06
Mar'15
How to ensure your hot-desking colleagues keep their data secure
Once hot-desking is implemented, data security suddenly demands greater attention
-
March 05, 2015
05
Mar'15
China and US cross swords over software backdoors
Barack Obama criticises Chinese plans to force tech firms trading in China to share encryption keys and put backdoors in software
-
February 27, 2015
27
Feb'15
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system
-
February 26, 2015
26
Feb'15
Cloud security still needs a lot more work, say European experts
Security and privacy remain a stumbling block for cloud computing, according to information experts at the Trust in the Digital World conference
-
February 24, 2015
24
Feb'15
PrivDog SSL compromise potentially worse than Superfish
Some versions of PrivDog software designed to block online ads compromise internet security in a similar way to Superfish
-
February 19, 2015
19
Feb'15
Intel Security warns of six social engineering techniques targeting businesses
An Intel Security report encourages businesses to address and educate employees on “six levers of influence” used by hackers
-
February 17, 2015
17
Feb'15
International spyware operation linked to NSA
The US National Security Agency has reportedly hidden surveillance software in the hard drives of several top computer makers
-
February 16, 2015
16
Feb'15
MasterCard to pilot facial, voice and fingerprint authentication
MasterCard will pilot a biometric authentication and verification tool this year as part of cyber security technology investment
-
February 16, 2015
16
Feb'15
$1bn cyber heist underlines need for detection, say security experts
The theft of up to $1bn from financial institutions in a daring cyber crime operation underlines the need for monitoring, say security experts
-
February 12, 2015
12
Feb'15
Damballa report highlights the limitations of prevention-centric security
Anti-virus (AV) suppliers can take more than six months to create signatures for malware, according to a report from security firm Damballa
-
February 11, 2015
11
Feb'15
General election 2015: Major parties focus on tech agenda
With advancements around data protection and state surveillance of internet traffic, the UK is heading into its first tech-aware general election
-
February 06, 2015
06
Feb'15
Sony data breach claims first scalp as co-chair steps down
Amy Pascal, co-chair of Sony Pictures Entertainment, steps down in wake of data breach that exposed "inappropriate" comments in emails
-
February 05, 2015
05
Feb'15
Ross Ulbricht faces life for Silk Road dark market conviction
Ross Ulbricht faces life in jail after being convicted of seven charges related to the Silk Road online illegal drugs dark market
-
February 04, 2015
04
Feb'15
IoT could be key to farming, says Beecham Research
The internet of things could be key to the farming industry meeting the challenge of increasing food production by 70% by 2050, says report
-
February 04, 2015
04
Feb'15
Sony says cyber attack will cost $15m
Sony expects the investigation and remediation costs of the November 2014 cyber attack on its movie subsidiary will amount to $15m
-
February 03, 2015
03
Feb'15
EC3 announces industry partnership in fight against cyber crime
Europol's European Cybercrime Centre has partnered with security firm AnubisNetworks to help fight the global threat of cyber crime
-
February 02, 2015
02
Feb'15
Cyber crime is a threat to global economy, says researcher
Halting cyber crime could have a positive impact on the global economy, says Intel Security Europe security researcher and CTO
-
February 02, 2015
02
Feb'15
Darknet technologies have legitimate security uses, says researcher
Darket technologies have legitimate security applications for business, says security investigator
-
January 28, 2015
28
Jan'15
Data Protection Day: Five steps to securing data
Data management firm Iron Mountain has compiled five steps to securing data to mark Data Protection Day
-
January 26, 2015
26
Jan'15
QinetiQ hosts latest Cyber Security Challenge competition
UK defence firm QinetiQ challenged amateur cyber defenders in a realistic global online terrorist attack simulation
-
January 20, 2015
20
Jan'15
Younger users prefer biometrics to passwords
Younger bank customers would rather use biometrics than PINs and passwords for security, according to Visa Europe
-
January 16, 2015
16
Jan'15
Security Think Tank: How to deal with wiper malware
How much should businesses worry about destructive, computer-killing malware, and what steps should they take to mitigate attacks?
-
January 16, 2015
16
Jan'15
FTSE 350 firms still have long way to go on cyber risk
Many FTSE 350 firms still have a long way to go to manage the risks of a cyber attack, a government-backed cyber governance health check has revealed
-
January 13, 2015
13
Jan'15
Obama calls for single US data breach notification law
The US president is calling for a single US data breach notification law as part of proposed legislation to improve data security
-
January 12, 2015
12
Jan'15
Attackers bypass conventional security, says FireEye study
Hackers breach most conventional, signature-based security technologies, with 27% involving advanced threats
-
January 12, 2015
12
Jan'15
Sony Pictures admits it was unprepared for November’s cyber attack
Sony Pictures admits it was not prepared for the nature and extent of the cyber attack that hit the company last November
-
January 09, 2015
09
Jan'15
Traditional security putting UK businesses at risk, study shows
Traditional approaches to security are exposing UK businesses to heightened risk of attack, a study shows
-
January 08, 2015
08
Jan'15
Cyber attack now primary weapon for countries, says ViaSat UK
Cyber attacks are becoming the first weapon of choice for countries in conflict, says ViaSat UK
-
January 06, 2015
06
Jan'15
Google under fire over Windows zero-day disclosure
Google has come under fire for publishing a proof-of-concept attack exploiting a flaw in Windows 8.1 before Microsoft had released a security update
-
January 05, 2015
05
Jan'15
Hackers can exploit free mobile apps to steal data, study shows
Hackers can access private data by exploiting vulnerabilities mainly in free mobile apps, according to security researchers
-
December 31, 2014
31
Dec'14
Top 10 cyber crime stories of 2014
Computer Weekly looks back at the most significant stories on cyber crime in the past 12 months
-
December 17, 2014
17
Dec'14
Fears over the IT security of new banks are overblown
Challenger banks such as PayPal are perceived to be less secure than traditional banks when protecting personal data. But is this the case?
-
December 17, 2014
17
Dec'14
Cabinet Office begins procurement for next stage of Gov.uk Verify
The Cabinet Office has submitted a tender notice for a £150m three-year framework for the provision of identity assurance services
-
December 17, 2014
17
Dec'14
US interception in the EU faces new legal challenges
US government orders against Microsoft to hand over email data 'infringes privacy legislation' in other countries
-
December 10, 2014
10
Dec'14
Social media threats to business on the rise, says report
Social media threats to business are increasing, according to the first in-depth analysis covering Fortune 100 companies
-
December 08, 2014
08
Dec'14
Hacker group Lizard Squad downs Sony PlayStation Network
Sony remains in the firing line of hackers – who have now brought down its PlayStation Network and PlayStation Store
-
December 04, 2014
04
Dec'14
Cyber criminals are targeting smartphone supply chains, warn researchers
A new mobile trojan dubbed “DeathRing” is being pre-loaded onto smartphones somewhere in the supply chain, warn researchers
-
December 04, 2014
04
Dec'14
Sony hack exposes poor security practices
Sony Pictures Entertainment remains tight-lipped about its recent cyber attack, but security lessons can be drawn from what is known
-
December 01, 2014
01
Dec'14
Films leaked online after Sony Pictures hack
High-quality copies of still-to-be-released films have been leaked online a week after Sony Pictures Entertainment was reportedly hacked
-
November 28, 2014
28
Nov'14
CGI secures communications between pilots and air traffic control
Satellite communications firm Inmarsat has outsourced the provision of security IT and services to CGI
-
November 27, 2014
27
Nov'14
BSI urges UK businesses to bolster cyber security
UK businesses are at risk of reputational damage due to lack of awareness on how to protect their data assets, BSI research shows