News
IT risk management
-
September 30, 2014
30
Sep'14
Cyber Essentials for public sector IT suppliers: pros and cons
What are the pros and cons of the Cyber Essentials Scheme certification mandated for public sector IT suppliers?
-
September 25, 2014
25
Sep'14
Bash bug could be bigger threat than Heartbleed
A bug in the Bash command prompt software used by many Unix computers could be a greater threat than Heartbleed.
-
September 22, 2014
22
Sep'14
Conficker infections an indictment of IT security, says CWG
Conficker worm infections reflect the “sad state of affairs of IT security”, says the Conficker Working Group
-
September 17, 2014
17
Sep'14
Risk management key to cyber strategy, says BP
Cyber attacks constitute a group-level risk that is managed as part of BP’s standard set of risk management processes, says group chief
-
September 08, 2014
08
Sep'14
Ransomware on the rise, warns cyber threat report
The first half of 2014 saw an increase in online attacks that lock up user data and hold it for ransom, reports F-Secure Labs
-
August 28, 2014
28
Aug'14
Microsoft re-releases security bulletin MS14-045
Microsoft has re-released a software security update that was withdrawn because it put some computers in endless reboot loops
-
August 27, 2014
27
Aug'14
Security experts identify top 10 software design flaws
The IEEE Center for Secure Design has published a report on how to avoid the top 10 software security design flaws
-
August 21, 2014
21
Aug'14
Load balancing supports Kent County Council's VDI project
Kent County Council picks Kemp Technologies load balancers to support a deployment of VMware Horizon View and Workspace across its estate
-
August 11, 2014
11
Aug'14
USB-connected devices present cyber vulnerabilities
Connecting devices to computers using a USB port could lead to security breaches, say Berlin-based researchers
-
August 05, 2014
05
Aug'14
Cyber Security Challenge UK takes on the internet of things
The latest level of the Cyber Security Challenge will involve participants hacking devices connected to the internet of things
-
July 29, 2014
29
Jul'14
Tackle IAM with a risk-based approach, says KPMG
A risk-based approach is the best way to tackle identity and access management, says KPMG
-
July 16, 2014
16
Jul'14
Total internet failure: are you prepared?
A total internet failure could stop any business in its tracks, yet few are preparing for this possibility, KPMG has warned
-
July 09, 2014
09
Jul'14
Why using voice biometrics is a good idea
Banks and other organisations are turning to voice biometrics, but why do they believe the technology is good idea?
-
July 07, 2014
07
Jul'14
Smart light bulbs get security update
Smart light bulb maker LIFX has issued a firmware update after security researchers exposed a security weakness
-
July 04, 2014
04
Jul'14
Barclays passes government’s ‘internet-born threat’ test
Barclays Bank has been awarded the government’s cyber security certificate for digital banking services after independent tests of services such as Pingit
-
July 04, 2014
04
Jul'14
Security Think Tank: The dos and don’ts of a good incident response plan
What does a good information security incident response plan look like?
-
July 02, 2014
02
Jul'14
ISPs take legal action against GCHQ over mass network infrastructure surveillance
Six global internet service providers (ISPs) have filed a legal complaint calling for a halt to GCHQ’s use of network infrastructure for surveillance
-
July 01, 2014
01
Jul'14
Industrial control systems increasingly under attack, says Kaspersky
Targeted attacks on industrial control systems take place on a regular and increasing basis, says Kaspersky Lab
-
June 17, 2014
17
Jun'14
Domino’s breach underlines value of personal data, say experts
The latest cyber breach to hit a high-profile brand underlines the high value of personal data, say security experts
-
June 16, 2014
16
Jun'14
Microsoft admits running out of IP addresses for Azure
Microsoft has assured US Azure customers data remains in the US, despite running out of US-registered IP addresses at times
-
June 09, 2014
09
Jun'14
IT departments unprepared for internet of things
Only 41% of IT professionals are working on projects to prepare their business for the internet of things
-
June 09, 2014
09
Jun'14
Turing Test 2014 marks historic milestone in artificial intelligence
A computer program has made history by passing the artificial intelligence test set by computer science pioneer Alan Turing
-
June 02, 2014
02
Jun'14
Cyber threats hiding in plain sight, says Palo Alto Networks
Cyber attackers exploit commonly used business applications to bypass security controls, research shows
-
May 30, 2014
30
May'14
UK shoe retailer Office hit by data breach
Data breach at UK shoe retailer Office prompts calls for online firms to beef up security around customer details
-
May 27, 2014
27
May'14
Android Outlook app has privacy issues, warn researchers
Microsoft’s Outlook.com app for Android is exposing users' data, warn security researchers
-
May 16, 2014
16
May'14
Internet of things security is relevant to business, says researcher
Internet of things is relevant to enterprise information security professionals, says researcher
-
May 09, 2014
09
May'14
Orange data breach underlines need for encryption, say experts
The theft of 1.3 million customer records from Orange, France underlines the need for encryption, say experts
-
May 08, 2014
08
May'14
Internet privacy could thwart data security, warns expert
Steps to improve online privacy could thwart data security, warns security expert Hugh Thompson
-
April 30, 2014
30
Apr'14
Infosec 2014: Threat knowledge is key to cyber security, say experts
Business should improve awareness of cyber risks to stay ahead of criminals, say experts
-
April 29, 2014
29
Apr'14
UK and Ireland cyber attacks up 300% in 2013, says FireEye
UK and Ireland enterprises were hit by an average of more than 70 new infections a day in 2013, a report shows
-
April 28, 2014
28
Apr'14
US judge orders Microsoft to hand over email data held in Dublin
A US Judge has ordered Microsoft to give the District Court access to the contents of one of its customer’s emails stored on a server located in Dublin
-
April 25, 2014
25
Apr'14
Cyber threat detection paramount, says SANS fellow
Cyber threat prevention is ideal, but detection is a must, says Eric Cole, SANS Institute fellow
-
April 25, 2014
25
Apr'14
Heartbleed prompts tech firms to pledge open-source support
Top tech firms have joined forces to support open-source software to help prevent future bugs like Heartbleed
-
April 17, 2014
17
Apr'14
Datacentre lessons learnt from Heartbleed bug
The Heartbleed bug, an OpenSSL flaw affecting millions of websites, has some lessons for datacentre providers and operators
-
March 27, 2014
27
Mar'14
Security an unnecessary expense, say one in six techies
One in six IT professionals see security as an unnecessary expense, a study has revealed
-
March 21, 2014
21
Mar'14
Customer privacy an ongoing challenge, says Unilever
Unilever has set up a programme to address the continually evolving challenge of privacy issues relating to customer data
-
March 19, 2014
19
Mar'14
Pirated software malware to cost business $491bn in 2014, study shows
Malware deliberately loaded into pirated or counterfeit software is expected cost enterprises $491bn in 2014
-
March 19, 2014
19
Mar'14
Firms urged to take tough action on Unix-based cyber attack
Security researchers have urged businesses to take action on a cyber criminal campaign that has seized control of 25,000+ Unix servers worldwide
-
March 17, 2014
17
Mar'14
SMEs believes they are immune to cyber attack
Most SMEs believe they are not at real risk of cyber attack, a survey has revealed
-
March 12, 2014
12
Mar'14
Government finally ends e-Borders programme
The government has formally ended the troubled e-Borders programme, with its intended functions merged into a new project
-
March 12, 2014
12
Mar'14
More than 162,000 WordPress sites used in DDoS attack
Security researchers have uncovered a DDoS attack that used more than 162,000 legitimate and unwitting WordPress websites
-
February 21, 2014
21
Feb'14
Employee mobiles expose firms to attack, says Webroot
Employees mobile devices expose companies to malicious applications and attacks, according to the latest mobile threat report from Webroot
-
February 19, 2014
19
Feb'14
UK firms see 1,000+ internal data breaches a day, study finds
Internal threats are not a high priority for UK firms despite more than 1,000 internal data breaches a day
-
February 19, 2014
19
Feb'14
NHS England puts patient database on hold
NHS England is to delay by six months the roll-out of its controversial Care.data scheme for sharing patient records through a central database
-
February 18, 2014
18
Feb'14
Cut Microsoft admin rights to mitigate 92% of threats, study shows
Removing Microsoft admin rights from employees mitigates 92% of critical vulnerabilities reported in 2013
-
February 11, 2014
11
Feb'14
UK among targets of 'Mask' advanced cyber espionage campaign
The UK has been hit more than 100 times in an advanced global cyber espionage campaign that has gone undetected for more than five years
-
February 06, 2014
06
Feb'14
UK critical infrastructure at risk of cyber attack, says IET report
UK critical national infrastructure is at risk of cyber attack, says a report by consultancy Atkins for the Institution of Engineering and Technology (IET)
-
February 05, 2014
05
Feb'14
Bank of England publishes Waking Shark II cyber security exercise results
Bank of England publishes the results of its Waking Shark II security exercise, which tested financial institutions' contingency plans for cyber attack
-
February 04, 2014
04
Feb'14
NHS site malicious redirects are a warning to developers
A coding error that redirected NHS website visitors to malicious content should be a warning to developers, say security experts
-
January 31, 2014
31
Jan'14
Hackers access Yahoo Mail with stolen passwords
Yahoo has revealed that hackers have tried to access some Yahoo Mail accounts with stolen passwords