News
IT security
-
June 21, 2016
21
Jun'16
Enterprises urged not to view security as a barrier to internet of things adoption
The Lower Colorado River Authority’s chief administrative officer urges enterprises to balance the risks of using the internet of things with the benefits connected devices can bring
-
June 21, 2016
21
Jun'16
Cyber security industry mostly welcomes report on TalkTalk breach
Most of the recommendations of a government committee inquiry into the TalkTalk breach have been welcomed, but pundits have expressed reservations about some, particularly proposed new fines
-
June 20, 2016
20
Jun'16
Lower average cost of Australian data breaches is not a sign of comfort
The average cost of a data breach to Australian organisations dropped in 2015, according to research
-
June 17, 2016
17
Jun'16
How MI5 and MI6 gather your personal data for surveillance
Publicly released documents shed light on the many databases and sources used by the intelligence services to gather bulk personal data about UK citizens
-
June 14, 2016
14
Jun'16
Shadow data and the risks posed by cloud storage and apps
Cloud storage and apps can open up an organisation to risks of data leakage. Computer Weekly looks at key areas of vulnerability and what you can do to prevent your data going viral
-
June 13, 2016
13
Jun'16
Singapore banks adopt voice biometrics for user authentication
Banks in Singapore are rolling out biometric technology to improve customer services by speeding up the authentication process
-
June 13, 2016
13
Jun'16
EU firms slow in detecting cyber attacks, study shows
European firms take an average of 469 days to discover a compromise, compared with an average of 146 days globally, according to Mandiant
-
June 12, 2016
12
Jun'16
Philippines government data breach is a warning to Asean region
Security is a rising concern in the Asean region, with fears fuelled by incidents such as the recent hacking incident in Manila
-
June 10, 2016
10
Jun'16
IoT security: Lack of expertise will hurt, says Bruce Schneier
Government action at national and international levels is essential for addressing IoT security issues, but the relevant expertise is lacking, according to security expert Bruce Schneier
-
June 10, 2016
10
Jun'16
Small businesses bearing the brunt of cyber crime, says FSB
The Federation of Small Businesses is calling for more government support for its members in defending against cyber threats
-
June 07, 2016
07
Jun'16
Internet traffic to triple by 2020, says Cisco
The latest edition of Cisco’s Visual Networking Index predicts a near tripling of internet traffic during the coming years as more than a billion people come online
-
June 07, 2016
07
Jun'16
Millions of sensitive IT services exposed to the internet, study finds
Encryption should become the default as study reveals millions of sensitive services are exposed to the internet, says Rapid7
-
June 06, 2016
06
Jun'16
How emails sent to and from Parliament are monitored
Government officials deny that emails sent by MPs are open to surveillance by GCHQ and NSA - we examine the evidence
-
June 01, 2016
01
Jun'16
Human error causes more data loss than malicious attacks
Stupid humans, you are the weakest link, at least according to the ICO
-
June 01, 2016
01
Jun'16
MPs’ private emails are routinely accessed by GCHQ
Computer Weekly investigation reveals the extent of interception of MPs’ and peers’ email communications and data
-
May 26, 2016
26
May'16
BSA warns of malware risk from unlicensed software
While piracy rates are declining, unauthorised software poses a big security risk, says the Business Software Alliance
-
May 26, 2016
26
May'16
UK government details plans for National Cyber Security Centre
The objectives of the UK’s National Cyber Security Centre are to address systemic vulnerabilities, reduce risks, respond to serious incidents and nurture national cyber security capability
-
May 25, 2016
25
May'16
A new wave of cyber attacks targets the Middle East’s banks
Hot on the heels of the Qatar National Bank breach comes a campaign employing advanced social engineering techniques
-
May 24, 2016
24
May'16
Network Collapse: Why the internet is flirting with disaster
It’s surprising the internet works at all, given the age of its core software. The question is, can we catch it before it falls over?
-
May 24, 2016
24
May'16
UK government announces CyberFirst bursary scheme
GCHQ will partner with other government departments and private industry to offer students a comprehensive package of financial assistance and cyber skills
-
May 20, 2016
20
May'16
NHS data security standards to be designed around technology, people and processes
The Care Quality Commission’s delayed review of NHS data security standards will encourage NHS organisations to have senior information risk owners and Caldicott Guardians at board level
-
May 19, 2016
19
May'16
Lawmaker Vaizey hails UK role in resolving datacentre sovereignty issues
Digital economy minister talks up government’s work in supporting the growth of the UK’s technology sector
-
May 19, 2016
19
May'16
Gov.uk Verify to go live 24 May 2016
On 24 May 2016, the government’s identity assurance platform will move from beta to “fully live”, after missing its original April go-live target
-
May 19, 2016
19
May'16
Lessons from LinkedIn data breach revelations
There are several important lessons to be learned from revelations about LinkedIn's 2012 data breach, say security experts
-
May 18, 2016
18
May'16
Cyber espionage campaign targets Ukraine separatists
Security researchers discover a surveillance operation against separatists in Eastern Ukraine using spear phishing attacks to spread previously unknown malware
-
May 17, 2016
17
May'16
Police set for better engagement with UK tech firms
The policing lead for digital investigation and intelligence says new structures will improve engagement and collaboration between the UK tech industry and police forces
-
May 13, 2016
13
May'16
Public cloud uptake rises, but Europe still lags behind the US
Okta research finds the most popular cloud applications in all regions are mail, sales and marketing, social media and document storage
-
May 13, 2016
13
May'16
Time to shift information security focus away from prevention, says Swiss bank CISO
Organisations need a new approach which recognises security is “breakable”, according to Michael Meli
-
May 13, 2016
13
May'16
10 key facts businesses need to note about the GDPR
With less than two years before the new EU data protection rules come into force, there are key areas businesses need to focus on to ensure they will be compliant
-
May 13, 2016
13
May'16
Swift reports another Bangladesh central bank-style cyber attack
Global financial messaging organisation Swift warns of a highly adaptive cyber criminal campaign targeting banks with user credentials to submit transfer requests
-
May 12, 2016
12
May'16
IAM central to Deutsche Bank’s digital transformation
Deutsche Bank is using a centralised identity and access management (IAM) system and an application program interface (API) architecture for digital transformation
-
May 10, 2016
10
May'16
UK court rejects demands for Lauri Love to hand over encryption keys
Court rules against an attempt by the National Crime Agency to force activist Lauri Love to disclose encryption keys by bypassing the Regulation of Investigatory Powers Act
-
May 09, 2016
09
May'16
Australian health sector an easy target for cyber criminals, says IBM
A push to encourage greater adoption of electronic health records has raised the spectre of online record theft
-
May 06, 2016
06
May'16
Ransomware emerges as a top cyber threat to business
Security researchers at Kasperky Lab and FireEye confirm that the upward trend of ransomware is continuing and has emerged as a top threat to business
-
May 04, 2016
04
May'16
D-Day for GDPR is 25 May 2018
The European Parliament’s official publication of the General Data Protection Regulation means it will become enforceable on 25 May 2018
-
May 03, 2016
03
May'16
Gov.uk Verify misses April go-live target
The Government Digital Service didn’t meet its target of taking identity assurance service Verify out of beta by the end of April, but is “nearly there”, according to programme director Janet Hughes
-
April 29, 2016
29
Apr'16
Cyber security in Belgium will gain prominence after terror attacks
Belgium’s physical security has been branded inadequate, so how does the country’s cyber security measure up?
-
April 28, 2016
28
Apr'16
Payment card industry issues data security standard update
PCI DSS version 3.2 introduces six new requirements for compliance, some additional guidance and a raft of clarifications
-
April 28, 2016
28
Apr'16
Technology moving too fast for governments to keep up, says former Darpa chief
Former US defence technology chief supports encryption and privacy, despite intelligence services’ fears
-
April 27, 2016
27
Apr'16
IPv6 alone will not secure IoT, warns GE CISO
It is important for all users of the internet of things to understand what they are getting into with IPv6, and to be aware of the risks and myths, says GE CISO Hanns Proenen
-
April 26, 2016
26
Apr'16
Business failing to learn lessons of past cyber attacks, report shows
Organisations are still failing to address basic security issues and well-known attack methods, Verizon’s latest Data Breach Investigations Report reveals
-
April 21, 2016
21
Apr'16
GCHQ told analysts to assume surveillance 'bulk data' is legal
Documents obtained by charity Privacy International reveal insights into GCHQ’s collection of sensitive bulk data, as lawyers question the impact of surveillance on legal privilege, fair trials and protection of whistleblowers
-
April 19, 2016
19
Apr'16
Employees’ use of personal devices puts firms at risk of malware infection, says report
Downloaders care about their own security while grabbing pirated content, not that of their employers
-
April 15, 2016
15
Apr'16
Israeli volunteers ready their cyber defences as Anonymous affiliates attack
Every April, Israel braces itself for an onslaught from pro-Palestinian hackers, but the occupants of a small conference room in Tel Aviv stand in their way
-
April 15, 2016
15
Apr'16
BBC turns micro:bit computers into IoT devices
The BBC and Nominet demonstrate a new use case for the micro:bit computer and hope to turn Britain’s schoolchildren into internet of things pioneers
-
April 13, 2016
13
Apr'16
NCA attempts 'back door' access to obtain activist Lauri Love’s passwords
Court told that use of civil proceedings to force disclosure of alleged hacker Lauri Love's passwords is disproportionate and would breach human rights law
-
April 11, 2016
11
Apr'16
QA launches cyber attack defence training facility in London
Training firm QA launches a cyber attack simulation facility in London to enable organisations to test and learn cyber defence skills
-
April 11, 2016
11
Apr'16
Activist Lauri Love faces order to disclose encryption keys
The UK’s National Crime Agency takes an unusual legal step to force a former university student accused of hacking to disclose encryption keys
-
April 11, 2016
11
Apr'16
IT specialist sentenced for stealing NHS computer equipment
A former NHS IT worker is convicted of stealing hospital computer equipment from Doncaster and Bassetlaw Hospitals NHS Foundation trust and selling them on eBay
-
April 06, 2016
06
Apr'16
Panama Papers revealed by graph database visualisation software
The 11.5 million files leaked from Panama-based law firm Mossack Fonseca are being interrogated by journalists using a combination of Neo4j’s graph database and data visualisation software Linkurious