News
IT security
-
May 25, 2011
25
May'11
Virtual desktop benefits include tighter security, hot desking
With the help of hot desking and other virtualisation technologies, the Basildon Borough Council was able to centralise its security administration and reduce its number of desks by more than 30%.
-
May 18, 2011
18
May'11
Future of NHS National Programme for IT in critical condition following NAO report
The remaining NHS National Programme for IT could be scrapped entirely, as the project's aim to deliver electronic records for every patient has fallen far below expectations, according to a National Audit Office report.
-
May 17, 2011
17
May'11
Government vigilance steps up after George Osborne reveals extent of cyber attacks
Security experts have called for UK government departments to be vigilant after chancellor George Osborne revealed that 20,000 e-mails are sent by hostile intelligence agencies to the UK government each month.
-
May 12, 2011
12
May'11
Analysis: Will Android dominance increase IT security threats for business?
The Android Market is forecast to become the world's biggest mobile content platform by August 2011, according to research by mobile application research firm Distimo.
-
May 10, 2011
10
May'11
New ICO guidance issued on EU cookie law
The Information Commissioner's Office has released practical guidance for companies to comply with the new EU cookie law.
-
May 06, 2011
06
May'11
Hackers plan third attack on Sony
Hackers are planning a third attack on Sony in retaliation for its handling of the PlayStation Network and Online Entertainment services data breaches, according to US reports.
-
May 05, 2011
05
May'11
What cloud risks should business consider after Amazon's EC2 outage?
Amazon's recent outage has raised questions over the reliability of cloud services. If Amazon, with its global reach, cannot get IT right, how can CIOs expect other operators to cope? Jenny Williams investigates.
-
April 29, 2011
29
Apr'11
Store dealing with dishonest employees uses internal theft prevention software
A London-based sushi chain expects to save almost £1 million this year with the help of new fraud-detection software.
-
April 27, 2011
27
Apr'11
HSBC Insurance works with IBM to solve Solvency II
HSBC Insurance in the UK is using IBM Global Services to support its European Solvency...
-
April 20, 2011
20
Apr'11
Infosec 2011: APT attacks a real threat to business, says security panel
Advanced Persistent Threats are a reality and cannot be dismissed as a myth or media hype, according to a panel of experts debating the top threats at Infosecurity Europe 2011 in London.
-
April 20, 2011
20
Apr'11
Shutting down a botnet, US Government disables Coreflood
Coreflood, a botnet almost ten years old, has been taken down by the FBI and US Department of Justice by obtaining permission to hijack the command and control servers and send a 'stop' command to infected PCs. Is this overstepping the privacy line?
-
April 19, 2011
19
Apr'11
Infosec 2011: Cisco announces new tools for securing the mobile enterprise
Cisco has introduced new security products to its Borderless Networks portfolio to help IT departments manage mobile devices, changing workforce habits and the impact of video on the network.
-
April 18, 2011
18
Apr'11
Growth of NFC to drive overhaul of Chip and PIN equipment
The growth of near-field communication (NFC) in the UK will drive the replacement of retailers' Chip and PIN point of sale (PoS) equipment, according to an analyst.
-
April 13, 2011
13
Apr'11
Building an Olympics network
Preparation is clearly the key to Olympic success, as players on 27 July 2012 will see years of finely honed practice condensed into one gruelling fortnight
-
April 13, 2011
13
Apr'11
Infosec 2011: Charity sector shows the way to balance budget and security
Tackling security project by project is an effective way of securing data on a limited budget, says Matt Holland, head of information security at children's charity NSPCC.
-
April 12, 2011
12
Apr'11
Infosec 2011: Compliance the biggest security juggernaut, says security expert
The biggest security compliance juggernaut for businesses is concentrating on achieving compliance rather than changing they way they work, says Des Ward, president of the Cloud Security Alliance UK and Ireland chapter.
-
April 11, 2011
11
Apr'11
Manageability issues impede adoption of virtualisation
Virtual infrastructure management challenges are hindering the adoption of virtualisation within businesses, according to research.
-
April 08, 2011
08
Apr'11
Motivated, information security policye-aware employees are the best defence
Keeping employees motivated is the best way to ensure you have satisfied customers, and if it is an employee's responsibility to keep the customers happy,...
-
April 08, 2011
08
Apr'11
Admins face huge April Patch Tuesday security update from Microsoft
Microsoft has announced that it will release 17 security bulletins to address 64 vulnerabilities
-
April 08, 2011
08
Apr'11
After breach at RSA, two-factor authentication options abound
Companies specialising in two-factor authentication hope to boost business following the breach of RSA's SecurID, and many plan to capitalise with new products at Infosecurity Europe.
-
April 07, 2011
07
Apr'11
Sophisticated cyber thieves behind Epsilon data breach, says parent company
US marketing firm Epsilon was hit by one of the biggest data thefts to date, the work of highly sophisticated cyber thieves, says parent company Alliance...
-
April 05, 2011
05
Apr'11
Sex offence technology helps business avoid legal liability
Technology that cross references image hash codes against child sexual abuse material will help businesses avoid legal liability.
-
April 05, 2011
05
Apr'11
City of York falls foul of data protection act following printer mix-up
The City of York Council has fallen foul of the Data Protection Act after having accidentally disclosed personal data following a printer mix-up.
-
April 04, 2011
04
Apr'11
RSA discloses phishing-attack data breach details
RSA, the security division of EMC, has revealed the firm's data breach in mid March was the result of a spear phishing attack. The spear phishing attack exploited an Adobe Flash vulnerability that was unpatched at the time.
-
March 31, 2011
31
Mar'11
Microsoft publishes report on its Security Development Lifecycle
Microsoft has published a new report that outlines nine years of progress in developing, improving and sharing the Security Development Lifecycle (SDL) process.
-
March 30, 2011
30
Mar'11
Two-factor authentication alternatives
Worried by the breach at RSA? Here are some two-factor authentication alternatives to consider.
-
March 29, 2011
29
Mar'11
Open Group launches guide to boost ISO 27005 efforts
A new guide from the Open Group is designed to help organisations meet ISO 27005 standards, but some risk management professionals feel it may not be so effective.
-
March 28, 2011
28
Mar'11
Spotify hit by malicious ads
Spotify, the popular streaming music service, has been displaying malicious advertisements to users of its Free version.
-
March 28, 2011
28
Mar'11
Businesses spend over £600k a week on data security abroad
Companies are spending up to £624,000 a week to secure their most sensitive business data abroad, a study has revealed.
-
March 25, 2011
25
Mar'11
Hackers steal member email details from TripAdvisor site
A number of TripAdvisor members may receive spam after hackers stole email details from the travel website.
-
March 23, 2011
23
Mar'11
SAP combines GRC and BI in new platform
SAP has launched a new governance, risk and compliance platform that combines and integrates existing GRC and business intelligence technologies.
-
March 23, 2011
23
Mar'11
Budget 2011: UK public worried spending cuts will impact data security
A large proportion of the UK public is worried that government spending cuts will have a negative effect on data security, a survey has revealed.
-
March 22, 2011
22
Mar'11
What is OpenID? How to use OpenID SSO in your organisation
An OpenID SSO system allows organisations to simplify website user authentication management. But is OpenID security an issue? Expert Michael Cobb explains.
-
March 18, 2011
18
Mar'11
RSA hit by advanced persistent threat attacks
RSA, the security division of EMC, has revealed that attackers have stolen information from the company's IT systems
-
March 17, 2011
17
Mar'11
Twitter increases security with HTTPS encrypted tweets setting
Twitter has added a new profile setting to increase the level of security when accessing the mobile blogging site over an unsecured Wi-Fi connections.
-
March 17, 2011
17
Mar'11
Ban threat looms for Blackberry services as India demand corporate data access
India could block Research in Motion (RIM) from 31 March 2011 after government officials expressed dissatisfaction with access to Blackberry services.
-
March 16, 2011
16
Mar'11
Trusteer debuts no-software malware protection
Secure web access firm Trusteer has announced a web login and transaction monitoring service to detect malware without installing software.
-
March 16, 2011
16
Mar'11
RIM urges Blackberry users to disable Javascript after web browsing vulnerability revealed
Research in Motion (RIM) is advising Blackberry smartphone users to disable Javascript to protect against a security vulnerability in its web browser.
-
March 15, 2011
15
Mar'11
IT failures blamed for immigration system faults
IT failures have been blamed for failures of the points based immigration system in a National Audit Office (NAO) report.
-
March 15, 2011
15
Mar'11
Adobe warns of zero-day vulnerability in Adobe Flash
Adobe has published a security advisory for a critical vulnerability in Adobe Flash that can be used to take control of an attacked machine.
-
March 10, 2011
10
Mar'11
Most organisations approach IAM in the wrong way, says Gartner
Most organisations are approaching identity and access management (IAM) in the wrong way, by planning deployments around technologies, says Gartner.
-
March 10, 2011
10
Mar'11
Advanced persistent threats - are businesses prepared?
Businesses usually attain adequate levels of IT defences at the point that it becomes more cost effective for cyber criminals to target someone else.
-
March 09, 2011
09
Mar'11
Industry calls on employers to say what security skills are needed
The National Skills Academy for IT is calling on employers to address the cyber security skills gap by sharing views on the most useful courses and qualifications.
-
March 08, 2011
08
Mar'11
Exclusive: Free software guru Richard Stallman on government IT and why he hates the cloud
The founding father of the free software movement tells Computer Weekly why government just doesn't "get it"
-
March 07, 2011
07
Mar'11
France's G20 files target of cyber attack
France's files on the G20 meetings were the target of a cyber attack, the country's finance minister has confirmed.
-
March 07, 2011
07
Mar'11
Western Digital bids $4.3 billion for Hitachi Global Storage Technologies
Western Digital has tabled a bid of $4.25m (£2.6bn) to acquire Hitachi Global Storage Technologies ending the Japanese HDD vendor's previous preparations for an IPO.
-
March 07, 2011
07
Mar'11
HSBC uses token to secure smartphone banking
HSBC is sending four million online banking customers a security token which will enable them to log in to their online bank account wherever they are, without using a card reader.
-
March 07, 2011
07
Mar'11
Malvertising, pop-up ad virus problems demand more user protection
A recent pop-up ad infection on the London Stock Exchange's website highlights the growing scourge of malicious advertising, or malvertising.
-
March 01, 2011
01
Mar'11
Intel finalises £5bn acquisition of McAfee
Intel has confirmed the completion of its $7.7bn (£5bn) acquisition of security software giant McAfee.
-
February 25, 2011
25
Feb'11
nullcon 2011 Day Zero: Photo feature
Botnet detection, fuzzing intricacies, Zeus MitMo, VoIP attacks, and more. nullcon Day Zero saw considerable action worth the capture.