News
Hackers and cybercrime prevention
-
May 29, 2013
29
May'13
Stratfor hacker pleads guilty
US hacktivist Jeremy Hammond pleads guilty to accessing computers of law enforcement agencies and government contractors illegally
-
May 29, 2013
29
May'13
Syrian hackers deface Sky Android apps
Syrian hackers have defaced several of Sky’s Android apps, forcing the broadcaster to remove them temporarily from the Google Play store
-
May 22, 2013
22
May'13
UK ISPs block access to pirate sites
UK internet service providers have begun blocking access to two sites accused of breaking copyright laws
-
May 21, 2013
21
May'13
Privileged accounts key to most APT attacks, says Cyber-Ark
The theft, misuse and exploitation of privileged accounts is becoming an increasingly key tactic in advanced persistent threat attacks
-
May 16, 2013
16
May'13
Most IT environments immature, Microsoft reveals
Most business IT environments are immature, analysis of data from Microsoft’s Cloud Security Readiness Tool has revealed
-
May 15, 2013
15
May'13
Microsoft declares conformance with ISO 27034-1
Microsoft has declared conformance with ISO 27034-1, the first part of an international standard for secure software development
-
May 13, 2013
13
May'13
Cyber criminals hack Washington court system
Hackers gain access to the personal data of 160,000 US citizens after compromising Washington State court service servers
-
May 07, 2013
07
May'13
Symantec helps NHS trust cut security costs by a quarter
The Royal Liverpool and Broadgreen University Hospitals NHS Trust cut security costs by 25% in its partnership with security supplier Symantec
-
May 03, 2013
03
May'13
Netherlands considers hacking powers for police
The Netherlands government considers legislation to give police powers to hack into computers, install spyware and read emails
-
May 01, 2013
01
May'13
What’s to be done about data breach discovery?
The time from first contact by cyber attackers to the victim learning of it is still measured in months and years, not hours and days
-
April 29, 2013
29
Apr'13
Another online firm hit by data breach
Online deals service LivingSocial is the latest company to report a breach of its computer systems that may mean attackers accessed customer details
-
April 25, 2013
25
Apr'13
Infosec 2013: Cyber crime challenges law enforcement
Cyber crime is forcing police and law enforcement agencies to re-think basic skills needed, according to experts at Infosecurity Europe 2013
-
April 25, 2013
25
Apr'13
Lib Dems will block Snoopers’ Charter, says Nick Clegg
The draft Communications Data Bill will not go ahead while the Lib Dems are in government, says deputy prime minister Nick Clegg
-
April 22, 2013
22
Apr'13
Infosec 2013: University research challenges reliability of IPS
Research shows intrusion prevention systems (IPS) are not as effective at detecting malicious activity as some might think
-
April 22, 2013
22
Apr'13
Security spend misaligned with threats, says security veteran
Security budget allocations have remained the same for the past 15 years, but threats have changed, says Shlomo Kramer, chief executive at security firm Imperva
-
April 22, 2013
22
Apr'13
US jails LulzSec hacker Cody Kretsinger
The US has jailed a member of hacktivist group LulzSec for a year for his role in breaching computer systems at Sony Pictures Entertainment in 2011
-
April 19, 2013
19
Apr'13
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft
-
April 15, 2013
15
Apr'13
Anonymous hacks North Korean websites for a second time
Members of the Anonymous hacktivist collective claim to have again hacked several prominent North Korean websites
-
April 11, 2013
11
Apr'13
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations
-
April 11, 2013
11
Apr'13
Porn websites pose malware risk, says researcher
Browsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher
-
April 11, 2013
11
Apr'13
South Korea accuses North Korea of launching cyber attacks
South Korea blames North Korea for the cyber attacks that shut down thousands of computers at broadcasters and banks two weeks ago
-
April 03, 2013
03
Apr'13
Case Study: 192business switches to tokenisation to speed up business processes
Online payment card verification firm 192business uses tokenisation to speed up its processes and protect credit card details from fraud
-
April 03, 2013
03
Apr'13
US Army practises poor data security on mobile devices
Pentagon inspector general finds smartphones and tablets the US Army buys are not configured to protect sensitive data and allow remote wipe
-
April 03, 2013
03
Apr'13
Anonymous threatens to declare cyber war on North Korea
Anonymous hacktivist collective has threatened North Korea with cyber war if leader Kim Jong-un does not resign and install free democracy
-
March 27, 2013
27
Mar'13
UK government sets up cyber security fusion cell
A cyber security “fusion cell” for cross-sector threat data sharing aims to put government, industry and information security analysts side-by-side
-
March 26, 2013
26
Mar'13
Employees ignore security rules, say infosec pros
Most information security professionals believe corporate employees wilfully ignore security rules, survey at RSA Conference 2013 reveals
-
March 25, 2013
25
Mar'13
Malware in counterfeit software to cost business $114bn in 2013
Dealing with malware in counterfeit software will cost global enterprises an estimated $114bn in 2013, says research firm IDC
-
March 22, 2013
22
Mar'13
Six security issues to tackle before encrypting cloud data
Concern about security and privacy is likely to drive adoption of cloud encryption, but there are six security issues businesses should tackle
-
March 13, 2013
13
Mar'13
US authorities investigate hack of Michelle Obama and other high-profile people
US authorities are investigating hackers who allegedly stole financial information belonging to US first lady Michelle Obama
-
March 11, 2013
11
Mar'13
Phishing emails sent in pairs to lend authenticity, says training company
Phishing emails are now being deployed in pairs to create the illusion of authenticity, says security awareness training company PhishMe
-
March 11, 2013
11
Mar'13
Microsoft releases four critical security updates
Microsoft is to release four “critical” patches in its monthly Patch Tuesday security update, according to the advance notice.
-
March 06, 2013
06
Mar'13
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy
-
February 28, 2013
28
Feb'13
RSA 2013: Suppliers need to prepare for new security vulnerability handling standards
Software makers and online service providers need to prepare for two ISO standards on vulnerability handling processes due by the end of 2013
-
February 27, 2013
27
Feb'13
350,000 different types of spam SMS messages were targeted at mobile users in 2012
350,000 different variants of unsolicited spam SMS messages were accounted for in 2012, with 53,000 variants logged for December alone
-
February 27, 2013
27
Feb'13
Health records should be protected like bank details, says BCS
The BCS and NHS say people should protect their online medical records in the same way they look after their bank details
-
February 26, 2013
26
Feb'13
RSA 2013: Obama cyber order will have significant effect, says DoHS
President Barack Obama’s executive order on cybersecurity is a “very big deal” says Mark Weatherford, deputy under-secretary for cybersecurity at the US Department of Homeland Security (DoHS).
-
February 22, 2013
22
Feb'13
Music companies critical of Google’s anti-piracy efforts
Music companies have accused Google of failing to fulfil a pledge not to give prominent rankings in search results to websites offering illegal music downloads.
-
February 15, 2013
15
Feb'13
Bad outsourcing decisions cause 63% of data breaches
Bad outsourcing decisions nearly two-thirds of data breaches investigated by security firm Trustwave in the past year
-
February 11, 2013
11
Feb'13
IT expert in Microsoft monopoly case faces £2.5m legal fight
A computer expert who advised the European Commission in its investigation into anti-competitive behaviour by Microsoft faces £2.5bn legal battle
-
February 06, 2013
06
Feb'13
Twitter strengthens login security after hacker attack
Days after a hacking attack, it has emerged that Twitter plans to strengthen its login security with two-factor authentication
-
February 04, 2013
04
Feb'13
Twitter resets a quarter of a million accounts after hacker attack
Twitter has reset the passwords of 250,000 accounts after detecting and shutting down a hacker attack last week.
-
January 28, 2013
28
Jan'13
Why has NAC, like DLP, failed to take off?
Why are organisations not investing in systems that are designed to keep malicious actors out of their networks?
-
January 25, 2013
25
Jan'13
Encryption is safe bet, says SafeNet
Encryption is the only thing that can give peace of mind to CIOs and CISOs, says Dave Hansen, president and CEO of security firm SafeNet
-
January 24, 2013
24
Jan'13
ICO hits Sony with £250,000 data breach penalty
The Information Commissioner’s office (ICO) has fined Sony Computer Entertainment Europe £250,000 for breaching the Data Protection Act
-
January 22, 2013
22
Jan'13
Why has DLP never taken off?
Why is data loss prevention (DLP) technology not being adopted if it provides the very protection most businesses need?
-
January 14, 2013
14
Jan'13
Oracle rushes out patches for Java zero days
Oracle has released two out-of-band security updates for the latest zero day vulnerabilities in Java
-
January 11, 2013
11
Jan'13
Disable Java to protect from latest zero-day
Security researchers are warning of a zero-day vulnerability in all versions of Java, including the latest Java 7 update 10
-
January 10, 2013
10
Jan'13
Software piracy international in scope, says Fast
The scale of software piracy is both international in scope and military in its execution, says the Federation Against Software Theft (Fast)
-
January 08, 2013
08
Jan'13
Misuse of social media could wreak havoc, warns World Economic Forum
The rapid spread of false information through social media poses a growing threat to business and society, the World Economic Forum has warned
-
January 07, 2013
07
Jan'13
Ernst & Young email keyword analysis identifies fraudsters
Fraud investigators have revealed the most common words used in email conversations by employees engaged in rogue trading and fraud