News
IT for consulting and business services
-
June 12, 2013
12
Jun'13
Senior judge hears Barnet Council outsourcing challenge
The second most senior judge in England and Wales will hear a legal challenge against Barnet Council’s outsourcing programme
-
June 11, 2013
11
Jun'13
UK links to US internet surveillance remain unclear
The government insists that UK spy agencies operate within the law, but questions remain
-
June 07, 2013
07
Jun'13
PM urged to criminalise internet rape porn
Campaigners are calling for the criminalisation of possessing internet pornography depicting rape
-
June 05, 2013
05
Jun'13
Human error causes most data breaches, Ponemon study finds
Human errors and system problems caused two-thirds of data breaches in 2012, according to a study from Symantec and the Ponemon Institute
-
May 29, 2013
29
May'13
Stratfor hacker pleads guilty
US hacktivist Jeremy Hammond pleads guilty to accessing computers of law enforcement agencies and government contractors illegally
-
May 29, 2013
29
May'13
Syrian hackers deface Sky Android apps
Syrian hackers have defaced several of Sky’s Android apps, forcing the broadcaster to remove them temporarily from the Google Play store
-
May 22, 2013
22
May'13
O2 questions CWU redundancy claims as union threatens action
Mobile operator O2 questions Communication Workers Union (CWU) claim of 600 redundancies in outsourcing deal with Capita
-
May 21, 2013
21
May'13
O2 selects Capita for 10-year customer service outsource
Mobile operator O2 is outsourcing management of its customer services centres to Capita in a 10-year deal expected to be worth about £1.2bn
-
May 21, 2013
21
May'13
Privileged accounts key to most APT attacks, says Cyber-Ark
The theft, misuse and exploitation of privileged accounts is becoming an increasingly key tactic in advanced persistent threat attacks
-
May 16, 2013
16
May'13
Most IT environments immature, Microsoft reveals
Most business IT environments are immature, analysis of data from Microsoft’s Cloud Security Readiness Tool has revealed
-
May 15, 2013
15
May'13
Microsoft declares conformance with ISO 27034-1
Microsoft has declared conformance with ISO 27034-1, the first part of an international standard for secure software development
-
May 08, 2013
08
May'13
Adobe moves to cloud-based subscription model
Adobe has announced that it is to introduce a cloud-based subscription model for popular applications, including Photoshop
-
May 07, 2013
07
May'13
Symantec helps NHS trust cut security costs by a quarter
The Royal Liverpool and Broadgreen University Hospitals NHS Trust cut security costs by 25% in its partnership with security supplier Symantec
-
May 07, 2013
07
May'13
Windows 8 passes 100 million in sales
Microsoft says Windows 8 OS has sold more than 100 million copies, roughly matching Windows 7 in the six months after launch
-
May 03, 2013
03
May'13
Netherlands considers hacking powers for police
The Netherlands government considers legislation to give police powers to hack into computers, install spyware and read emails
-
May 01, 2013
01
May'13
What’s to be done about data breach discovery?
The time from first contact by cyber attackers to the victim learning of it is still measured in months and years, not hours and days
-
April 25, 2013
25
Apr'13
Infosec 2013: Cyber crime challenges law enforcement
Cyber crime is forcing police and law enforcement agencies to re-think basic skills needed, according to experts at Infosecurity Europe 2013
-
April 25, 2013
25
Apr'13
Lib Dems will block Snoopers’ Charter, says Nick Clegg
The draft Communications Data Bill will not go ahead while the Lib Dems are in government, says deputy prime minister Nick Clegg
-
April 22, 2013
22
Apr'13
Infosec 2013: University research challenges reliability of IPS
Research shows intrusion prevention systems (IPS) are not as effective at detecting malicious activity as some might think
-
April 22, 2013
22
Apr'13
Security spend misaligned with threats, says security veteran
Security budget allocations have remained the same for the past 15 years, but threats have changed, says Shlomo Kramer, chief executive at security firm Imperva
-
April 22, 2013
22
Apr'13
US jails LulzSec hacker Cody Kretsinger
The US has jailed a member of hacktivist group LulzSec for a year for his role in breaching computer systems at Sony Pictures Entertainment in 2011
-
April 19, 2013
19
Apr'13
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft
-
April 19, 2013
19
Apr'13
Microsoft reports strong quarterly results for all divisions
Microsoft reported profit of $6bn for the past quarter, up 17% from a year ago, despite a mixed response to Windows 8 and a decline in PC sales
-
April 15, 2013
15
Apr'13
Anonymous hacks North Korean websites for a second time
Members of the Anonymous hacktivist collective claim to have again hacked several prominent North Korean websites
-
April 15, 2013
15
Apr'13
Google reaches deal with EU competition authorities
Google has reportedly reached a deal with European Union (EU) competition authorities over concerns about its business practices
-
April 12, 2013
12
Apr'13
Google has another go at allaying EU competition concerns
Google has submitted a fresh set of proposals to address European concerns about its business practices and avoid punitive action
-
April 11, 2013
11
Apr'13
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations
-
April 11, 2013
11
Apr'13
Porn websites pose malware risk, says researcher
Browsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher
-
April 11, 2013
11
Apr'13
South Korea accuses North Korea of launching cyber attacks
South Korea blames North Korea for the cyber attacks that shut down thousands of computers at broadcasters and banks two weeks ago
-
April 10, 2013
10
Apr'13
Mott MacDonald rolls out unified communications
Global engineering firm Mott MacDonald signs Tata Communications for a five-year unified communications deal worth over $20m
-
April 03, 2013
03
Apr'13
Case Study: 192business switches to tokenisation to speed up business processes
Online payment card verification firm 192business uses tokenisation to speed up its processes and protect credit card details from fraud
-
April 03, 2013
03
Apr'13
US Army practises poor data security on mobile devices
Pentagon inspector general finds smartphones and tablets the US Army buys are not configured to protect sensitive data and allow remote wipe
-
April 03, 2013
03
Apr'13
Anonymous threatens to declare cyber war on North Korea
Anonymous hacktivist collective has threatened North Korea with cyber war if leader Kim Jong-un does not resign and install free democracy
-
April 02, 2013
02
Apr'13
Google closer to action from European privacy regulators
Google is another step closer to action by privacy regulators across Europe for failing to change the way it manages user data
-
March 27, 2013
27
Mar'13
UK government sets up cyber security fusion cell
A cyber security “fusion cell” for cross-sector threat data sharing aims to put government, industry and information security analysts side-by-side
-
March 26, 2013
26
Mar'13
Employees ignore security rules, say infosec pros
Most information security professionals believe corporate employees wilfully ignore security rules, survey at RSA Conference 2013 reveals
-
March 25, 2013
25
Mar'13
Malware in counterfeit software to cost business $114bn in 2013
Dealing with malware in counterfeit software will cost global enterprises an estimated $114bn in 2013, says research firm IDC
-
March 22, 2013
22
Mar'13
Six security issues to tackle before encrypting cloud data
Concern about security and privacy is likely to drive adoption of cloud encryption, but there are six security issues businesses should tackle
-
March 13, 2013
13
Mar'13
US authorities investigate hack of Michelle Obama and other high-profile people
US authorities are investigating hackers who allegedly stole financial information belonging to US first lady Michelle Obama
-
March 11, 2013
11
Mar'13
Phishing emails sent in pairs to lend authenticity, says training company
Phishing emails are now being deployed in pairs to create the illusion of authenticity, says security awareness training company PhishMe
-
March 11, 2013
11
Mar'13
Microsoft releases four critical security updates
Microsoft is to release four “critical” patches in its monthly Patch Tuesday security update, according to the advance notice.
-
March 11, 2013
11
Mar'13
AstraZeneca opts for co-operation after IBM falls out
AstraZeneca has changed its approach to outsourcing to encourage co-operation with suppliers after its deal with IBM failed to deliver
-
March 06, 2013
06
Mar'13
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy
-
February 28, 2013
28
Feb'13
RSA 2013: Suppliers need to prepare for new security vulnerability handling standards
Software makers and online service providers need to prepare for two ISO standards on vulnerability handling processes due by the end of 2013
-
February 26, 2013
26
Feb'13
RSA 2013: Obama cyber order will have significant effect, says DoHS
President Barack Obama’s executive order on cybersecurity is a “very big deal” says Mark Weatherford, deputy under-secretary for cybersecurity at the US Department of Homeland Security (DoHS).
-
February 22, 2013
22
Feb'13
Music companies critical of Google’s anti-piracy efforts
Music companies have accused Google of failing to fulfil a pledge not to give prominent rankings in search results to websites offering illegal music downloads.
-
February 15, 2013
15
Feb'13
Bad outsourcing decisions cause 63% of data breaches
Bad outsourcing decisions nearly two-thirds of data breaches investigated by security firm Trustwave in the past year
-
February 06, 2013
06
Feb'13
EU cyber strategy aimed at boosting preparedness and cooperation
The European cyber security strategy addresses insufficient national preparedness and boosting co-operation in the region, says the EC
-
February 06, 2013
06
Feb'13
Business avoids cloud over fear of government snooping
Almost half of IT professionals are deterred from keeping sensitive data in the cloud because of fear of government intervention and possible legal action, a survey has revealed
-
February 06, 2013
06
Feb'13
Twitter strengthens login security after hacker attack
Days after a hacking attack, it has emerged that Twitter plans to strengthen its login security with two-factor authentication