News
Hackers and cybercrime prevention
-
April 14, 2015
14
Apr'15
Security risk potential linked to young, mobile users
A study conducted by wireless supplier Aruba Networks has identified a distinct cohort of high-risk, security-agnostic workers
-
April 10, 2015
10
Apr'15
French TV5Monde network cyber attack the latest in destructive trend in system intrusions
The cyber attack on French television network TV5Monde is the latest in a growing list of incursions intended to destroy data and IT systems
-
April 08, 2015
08
Apr'15
Alleged White House hack highlights typical security failings, say experts
The alleged penetration of sensitive White House computer networks highlights typical security failings, say information security experts
-
April 08, 2015
08
Apr'15
CIO interview: Bruna Pellicci, global head of IT, Ashurst
Global law firm Ashurst is rolling out a new IT strategy based on single platforms worldwide for its core business areas
-
March 31, 2015
31
Mar'15
DDoS losses potentially £100k an hour, survey shows
DDoS attacks could expose 40% of businesses to losses of £100,000 or more an hour at peak times, a survey shows
-
March 30, 2015
30
Mar'15
British Airways rewards scheme hack highlights password problem
The hacking of British Airways’ executive club frequent flyer accounts shows the importance of using strong, unique passwords for all online accounts
-
March 26, 2015
26
Mar'15
UK attacks on crypto keys and digital certificates endemic
All UK security professionals polled in a global survey have responded to attacks on keys and certificates in past two years
-
March 25, 2015
25
Mar'15
Identity fraud still top UK fraud threat
Identity fraud continues to be the single biggest fraud threat, according to the latest report by UK fraud prevention service Cifas
-
March 24, 2015
24
Mar'15
Google warns of fake digital certificates
Google has warned of unauthorised digital certificates issued for several of its domains that could be used to intercept data traffic
-
March 20, 2015
20
Mar'15
Home devices threaten enterprise data security, warn researchers
Poor or lacking security on ADSL routers and other devices used by teleworkers a threat to global enterprise information security
-
March 19, 2015
19
Mar'15
Target agrees to $10m breach compensation
US retailer Target has agreed to a $10m compensation package for victims of its 2013 data breach
-
March 18, 2015
18
Mar'15
Premera hack exposes 11 million financial and medical records
US health insurance firm Premera Blue Cross reveals an IT systems breach, exposing financial and medical records of 11 million customers
-
March 17, 2015
17
Mar'15
Microsoft warns of fake SSL certificate for Windows Live
Microsoft has warned that a fake security certificate has been issued for the Windows Live domain that could be abused by attackers
-
March 13, 2015
13
Mar'15
Lookout bets on big data analytics to secure enterprise mobiles
Mobile security SaaS provider Lookout is betting on its cloud-based big data analytics capability to attract enterprise customers
-
March 13, 2015
13
Mar'15
Japan recruits hackers for cyber security force
The Japanese government plans to recruit hackers to identify and protect against cyber security threats
-
March 11, 2015
11
Mar'15
Why IAM is topping security investments in 2015
It is not surprising identity and access management (IAM) is set to move to the fore in 2015
-
March 09, 2015
09
Mar'15
US cyber crime indictment prompts calls for zero tolerance
A newly-revealed US indictment of three suspected cyber criminals has prompted a call for zero tolerance for cyber intrusions
-
March 09, 2015
09
Mar'15
Group claiming links to Isis hacks small business websites
The FBI is investigating the hacking of a number of SME websites in the US and Europe by people claiming affiliation with Islamic State
-
March 09, 2015
09
Mar'15
2015 IT priorities: SDN yet to prove itself, fear of network hacks growing
In Computer Weekly’s 2015 IT priorities study, software-defined networking is still behind management and monitoring as a networking priority
-
March 06, 2015
06
Mar'15
How to ensure your hot-desking colleagues keep their data secure
Once hot-desking is implemented, data security suddenly demands greater attention
-
March 05, 2015
05
Mar'15
China and US cross swords over software backdoors
Barack Obama criticises Chinese plans to force tech firms trading in China to share encryption keys and put backdoors in software
-
February 27, 2015
27
Feb'15
Case study: Norwegian insurer invests in Darktrace machine-learning cyber defence
Shipping insurance company DNK hopes to inspire the rest of the shipping industry to adopt Darktrace’s cyber defence system
-
February 26, 2015
26
Feb'15
Cloud security still needs a lot more work, say European experts
Security and privacy remain a stumbling block for cloud computing, according to information experts at the Trust in the Digital World conference
-
February 24, 2015
24
Feb'15
PrivDog SSL compromise potentially worse than Superfish
Some versions of PrivDog software designed to block online ads compromise internet security in a similar way to Superfish
-
February 19, 2015
19
Feb'15
Intel Security warns of six social engineering techniques targeting businesses
An Intel Security report encourages businesses to address and educate employees on “six levers of influence” used by hackers
-
February 17, 2015
17
Feb'15
International spyware operation linked to NSA
The US National Security Agency has reportedly hidden surveillance software in the hard drives of several top computer makers
-
February 16, 2015
16
Feb'15
MasterCard to pilot facial, voice and fingerprint authentication
MasterCard will pilot a biometric authentication and verification tool this year as part of cyber security technology investment
-
February 16, 2015
16
Feb'15
$1bn cyber heist underlines need for detection, say security experts
The theft of up to $1bn from financial institutions in a daring cyber crime operation underlines the need for monitoring, say security experts
-
February 12, 2015
12
Feb'15
Damballa report highlights the limitations of prevention-centric security
Anti-virus (AV) suppliers can take more than six months to create signatures for malware, according to a report from security firm Damballa
-
February 11, 2015
11
Feb'15
General election 2015: Major parties focus on tech agenda
With advancements around data protection and state surveillance of internet traffic, the UK is heading into its first tech-aware general election
-
February 06, 2015
06
Feb'15
Sony data breach claims first scalp as co-chair steps down
Amy Pascal, co-chair of Sony Pictures Entertainment, steps down in wake of data breach that exposed "inappropriate" comments in emails
-
February 05, 2015
05
Feb'15
Ross Ulbricht faces life for Silk Road dark market conviction
Ross Ulbricht faces life in jail after being convicted of seven charges related to the Silk Road online illegal drugs dark market
-
February 04, 2015
04
Feb'15
IoT could be key to farming, says Beecham Research
The internet of things could be key to the farming industry meeting the challenge of increasing food production by 70% by 2050, says report
-
February 04, 2015
04
Feb'15
Sony says cyber attack will cost $15m
Sony expects the investigation and remediation costs of the November 2014 cyber attack on its movie subsidiary will amount to $15m
-
February 03, 2015
03
Feb'15
EC3 announces industry partnership in fight against cyber crime
Europol's European Cybercrime Centre has partnered with security firm AnubisNetworks to help fight the global threat of cyber crime
-
February 02, 2015
02
Feb'15
Cyber crime is a threat to global economy, says researcher
Halting cyber crime could have a positive impact on the global economy, says Intel Security Europe security researcher and CTO
-
February 02, 2015
02
Feb'15
Darknet technologies have legitimate security uses, says researcher
Darket technologies have legitimate security applications for business, says security investigator
-
January 28, 2015
28
Jan'15
Data Protection Day: Five steps to securing data
Data management firm Iron Mountain has compiled five steps to securing data to mark Data Protection Day
-
January 26, 2015
26
Jan'15
QinetiQ hosts latest Cyber Security Challenge competition
UK defence firm QinetiQ challenged amateur cyber defenders in a realistic global online terrorist attack simulation
-
January 20, 2015
20
Jan'15
Younger users prefer biometrics to passwords
Younger bank customers would rather use biometrics than PINs and passwords for security, according to Visa Europe
-
January 16, 2015
16
Jan'15
Security Think Tank: How to deal with wiper malware
How much should businesses worry about destructive, computer-killing malware, and what steps should they take to mitigate attacks?
-
January 16, 2015
16
Jan'15
FTSE 350 firms still have long way to go on cyber risk
Many FTSE 350 firms still have a long way to go to manage the risks of a cyber attack, a government-backed cyber governance health check has revealed
-
January 13, 2015
13
Jan'15
Obama calls for single US data breach notification law
The US president is calling for a single US data breach notification law as part of proposed legislation to improve data security
-
January 12, 2015
12
Jan'15
Attackers bypass conventional security, says FireEye study
Hackers breach most conventional, signature-based security technologies, with 27% involving advanced threats
-
January 12, 2015
12
Jan'15
Sony Pictures admits it was unprepared for November’s cyber attack
Sony Pictures admits it was not prepared for the nature and extent of the cyber attack that hit the company last November
-
January 09, 2015
09
Jan'15
Traditional security putting UK businesses at risk, study shows
Traditional approaches to security are exposing UK businesses to heightened risk of attack, a study shows
-
January 08, 2015
08
Jan'15
Cyber attack now primary weapon for countries, says ViaSat UK
Cyber attacks are becoming the first weapon of choice for countries in conflict, says ViaSat UK
-
January 06, 2015
06
Jan'15
Google under fire over Windows zero-day disclosure
Google has come under fire for publishing a proof-of-concept attack exploiting a flaw in Windows 8.1 before Microsoft had released a security update
-
January 05, 2015
05
Jan'15
Hackers can exploit free mobile apps to steal data, study shows
Hackers can access private data by exploiting vulnerabilities mainly in free mobile apps, according to security researchers
-
December 31, 2014
31
Dec'14
Top 10 cyber crime stories of 2014
Computer Weekly looks back at the most significant stories on cyber crime in the past 12 months