News
Hackers and cybercrime prevention
-
August 05, 2013
05
Aug'13
Websites hacked to show child abuse images
More than 25 business websites worldwide have been hacked to show illegal images of child sex abuse
-
July 29, 2013
29
Jul'13
Continual vigilance key to security, says Damballa
UK businesses must update their approach to cyber security to look for signs of compromise continually
-
July 26, 2013
26
Jul'13
FireEye partners with Phishme for multi-layered security
Security technology developer FireEye has partnered with phishing awareness training firm PhishMe to offer a multi-layered approach to securing information networks
-
July 25, 2013
25
Jul'13
MI5 and GCHQ call for FTSE 350 cyber health check
Intelligence agencies MI5 and GCHQ call on UK’s top listed companies to take part in a cyber governance health check
-
July 23, 2013
23
Jul'13
Cisco buys cyber security company Sourcefire for $2.7bn
Networking giant Cisco has reached an agreement to buy cyber security business Sourcefire in a $2.7bn deal
-
July 22, 2013
22
Jul'13
Insider threat: Balancing security with privacy
How can organisations increase security without affecting productivity or encroaching on employees’ right to privacy?
-
July 22, 2013
22
Jul'13
UK to block online porn by default
The UK is to block online pornography by default to all new internet users, David Cameron is to announce
-
July 19, 2013
19
Jul'13
Facebook to acquire UK startup Monoidics
Facebook is to acquire UK startup Monoidics, which makes code verification and analysis tools and specialises in detecting coding errors
-
July 17, 2013
17
Jul'13
Tech firms target piracy profiting websites
Tech firms including Google, Yahoo and Microsoft join an initiative targeting websites that profit from piracy by cutting off advert revenue
-
July 16, 2013
16
Jul'13
More than one-fifth of UK firms hit by DDoS attacks in 2012
More than a fifth of UK firms experienced a disruptive distributed denial of service (DDoS) attack in 2012
-
July 15, 2013
15
Jul'13
Black market for software security flaws reaches new highs
The black market in previously undiscovered vulnerabilities in commercial software is so established that the average flaw sells for up to $160,000
-
July 10, 2013
10
Jul'13
Microsoft notches up over 3,000 copyright cases
In its battle against piracy, Microsoft says it has settled 3,265 copyright cases in the past year and warns of links to malware distribution
-
July 09, 2013
09
Jul'13
Will cloud services follow the evolution of the banking industry?
Cloud service providers say security will become the very reason companies choose cloud services in future
-
July 08, 2013
08
Jul'13
UK takes cyber threats to infrastructure seriously
The UK is taking seriously potential cyber threats to critical national infrastructure, according to GCHQ head Iain Lobban
-
July 05, 2013
05
Jul'13
Tougher EU penalties for cyber crime not enough, say security experts
The European Parliament has adopted a draft directive to toughen up EU penalties for cyber crime, but security experts say this is not enough on its own
-
July 05, 2013
05
Jul'13
Security Think Tank: Prism unlikely to change much
Does the data collected by Prism put the US Government at risk from other state or non-state sponsored activists?
-
July 05, 2013
05
Jul'13
NSA Prism scandal could hit US cloud providers, says EC vice-president
EC vice-president Neelie Kroes says US cloud services providers could lose business because of fears over US Prism surveillance programme
-
July 04, 2013
04
Jul'13
FBI warns of increased spear phishing attacks
The FBI has issued a warning about an increase in spear-phishing attacks targeting multiple industry sectors
-
July 02, 2013
02
Jul'13
Security Think Tank: Prism – Sitting duck or elaborate honeypot?
Does the data collected by Prism put the US Government at risk from other state or non-state sponsored activists?
-
July 01, 2013
01
Jul'13
Stuxnet leak investigation leads to project originator
The US government investigation into Stuxnet leak of classified information leads to retired general in the Marines, James Cartwright
-
June 26, 2013
26
Jun'13
Encrypting enterprises miss out on cloud benefits
Enterprises sending encrypted data to the cloud are missing out on some of the greatest benefits of cloud computing, says Thales e-Security
-
June 24, 2013
24
Jun'13
Identity management key to browser-based IT strategy
A cloud-based identity management system is key to enabling a browser-based IT strategy at online recruitment firm Reed.co.uk
-
June 21, 2013
21
Jun'13
Most firms underestimate volume of malware, study shows
Most companies greatly underestimate the number of malicious programs appearing daily, a global survey of more than 2,000 IT professionals has revealed
-
June 21, 2013
21
Jun'13
UK businesses failing to secure virtual environments, study finds
Most UK businesses are failing to secure data in virtual environments, a survey of IT decision makers has revealed
-
June 21, 2013
21
Jun'13
Government launches cyber awareness campaign
UK government debuts the first stage of a £4m cyber awareness campaign as part of the National Cyber Security Programme
-
June 07, 2013
07
Jun'13
PM urged to criminalise internet rape porn
Campaigners are calling for the criminalisation of possessing internet pornography depicting rape
-
June 05, 2013
05
Jun'13
Human error causes most data breaches, Ponemon study finds
Human errors and system problems caused two-thirds of data breaches in 2012, according to a study from Symantec and the Ponemon Institute
-
May 29, 2013
29
May'13
Stratfor hacker pleads guilty
US hacktivist Jeremy Hammond pleads guilty to accessing computers of law enforcement agencies and government contractors illegally
-
May 29, 2013
29
May'13
Syrian hackers deface Sky Android apps
Syrian hackers have defaced several of Sky’s Android apps, forcing the broadcaster to remove them temporarily from the Google Play store
-
May 22, 2013
22
May'13
UK ISPs block access to pirate sites
UK internet service providers have begun blocking access to two sites accused of breaking copyright laws
-
May 21, 2013
21
May'13
Privileged accounts key to most APT attacks, says Cyber-Ark
The theft, misuse and exploitation of privileged accounts is becoming an increasingly key tactic in advanced persistent threat attacks
-
May 16, 2013
16
May'13
Most IT environments immature, Microsoft reveals
Most business IT environments are immature, analysis of data from Microsoft’s Cloud Security Readiness Tool has revealed
-
May 15, 2013
15
May'13
Microsoft declares conformance with ISO 27034-1
Microsoft has declared conformance with ISO 27034-1, the first part of an international standard for secure software development
-
May 13, 2013
13
May'13
Cyber criminals hack Washington court system
Hackers gain access to the personal data of 160,000 US citizens after compromising Washington State court service servers
-
May 07, 2013
07
May'13
Symantec helps NHS trust cut security costs by a quarter
The Royal Liverpool and Broadgreen University Hospitals NHS Trust cut security costs by 25% in its partnership with security supplier Symantec
-
May 03, 2013
03
May'13
Netherlands considers hacking powers for police
The Netherlands government considers legislation to give police powers to hack into computers, install spyware and read emails
-
May 01, 2013
01
May'13
What’s to be done about data breach discovery?
The time from first contact by cyber attackers to the victim learning of it is still measured in months and years, not hours and days
-
April 29, 2013
29
Apr'13
Another online firm hit by data breach
Online deals service LivingSocial is the latest company to report a breach of its computer systems that may mean attackers accessed customer details
-
April 25, 2013
25
Apr'13
Infosec 2013: Cyber crime challenges law enforcement
Cyber crime is forcing police and law enforcement agencies to re-think basic skills needed, according to experts at Infosecurity Europe 2013
-
April 25, 2013
25
Apr'13
Lib Dems will block Snoopers’ Charter, says Nick Clegg
The draft Communications Data Bill will not go ahead while the Lib Dems are in government, says deputy prime minister Nick Clegg
-
April 22, 2013
22
Apr'13
Infosec 2013: University research challenges reliability of IPS
Research shows intrusion prevention systems (IPS) are not as effective at detecting malicious activity as some might think
-
April 22, 2013
22
Apr'13
Security spend misaligned with threats, says security veteran
Security budget allocations have remained the same for the past 15 years, but threats have changed, says Shlomo Kramer, chief executive at security firm Imperva
-
April 22, 2013
22
Apr'13
US jails LulzSec hacker Cody Kretsinger
The US has jailed a member of hacktivist group LulzSec for a year for his role in breaching computer systems at Sony Pictures Entertainment in 2011
-
April 19, 2013
19
Apr'13
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft
-
April 15, 2013
15
Apr'13
Anonymous hacks North Korean websites for a second time
Members of the Anonymous hacktivist collective claim to have again hacked several prominent North Korean websites
-
April 11, 2013
11
Apr'13
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations
-
April 11, 2013
11
Apr'13
Porn websites pose malware risk, says researcher
Browsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher
-
April 11, 2013
11
Apr'13
South Korea accuses North Korea of launching cyber attacks
South Korea blames North Korea for the cyber attacks that shut down thousands of computers at broadcasters and banks two weeks ago
-
April 03, 2013
03
Apr'13
Case Study: 192business switches to tokenisation to speed up business processes
Online payment card verification firm 192business uses tokenisation to speed up its processes and protect credit card details from fraud
-
April 03, 2013
03
Apr'13
US Army practises poor data security on mobile devices
Pentagon inspector general finds smartphones and tablets the US Army buys are not configured to protect sensitive data and allow remote wipe