News
Privacy and data protection
-
June 21, 2013
21
Jun'13
Government launches cyber awareness campaign
UK government debuts the first stage of a £4m cyber awareness campaign as part of the National Cyber Security Programme
-
June 11, 2013
11
Jun'13
UK links to US internet surveillance remain unclear
The government insists that UK spy agencies operate within the law, but questions remain
-
June 10, 2013
10
Jun'13
Telefonica Digital forms security group Eleven Paths
The business division of mobile operator Telefonica launches Eleven Paths, an independent company working on security issues in the workplace
-
June 07, 2013
07
Jun'13
PM urged to criminalise internet rape porn
Campaigners are calling for the criminalisation of possessing internet pornography depicting rape
-
June 05, 2013
05
Jun'13
Human error causes most data breaches, Ponemon study finds
Human errors and system problems caused two-thirds of data breaches in 2012, according to a study from Symantec and the Ponemon Institute
-
May 29, 2013
29
May'13
Stratfor hacker pleads guilty
US hacktivist Jeremy Hammond pleads guilty to accessing computers of law enforcement agencies and government contractors illegally
-
May 29, 2013
29
May'13
Syrian hackers deface Sky Android apps
Syrian hackers have defaced several of Sky’s Android apps, forcing the broadcaster to remove them temporarily from the Google Play store
-
May 22, 2013
22
May'13
UK ISPs block access to pirate sites
UK internet service providers have begun blocking access to two sites accused of breaking copyright laws
-
May 21, 2013
21
May'13
Privileged accounts key to most APT attacks, says Cyber-Ark
The theft, misuse and exploitation of privileged accounts is becoming an increasingly key tactic in advanced persistent threat attacks
-
May 16, 2013
16
May'13
Most IT environments immature, Microsoft reveals
Most business IT environments are immature, analysis of data from Microsoft’s Cloud Security Readiness Tool has revealed
-
May 15, 2013
15
May'13
Microsoft declares conformance with ISO 27034-1
Microsoft has declared conformance with ISO 27034-1, the first part of an international standard for secure software development
-
May 13, 2013
13
May'13
Cyber criminals hack Washington court system
Hackers gain access to the personal data of 160,000 US citizens after compromising Washington State court service servers
-
May 07, 2013
07
May'13
Symantec helps NHS trust cut security costs by a quarter
The Royal Liverpool and Broadgreen University Hospitals NHS Trust cut security costs by 25% in its partnership with security supplier Symantec
-
May 03, 2013
03
May'13
Netherlands considers hacking powers for police
The Netherlands government considers legislation to give police powers to hack into computers, install spyware and read emails
-
May 03, 2013
03
May'13
Computer Weekly European User Awards for Security: Winners
The winners are in for the Computer Weekly European User Awards for Security. See who made the top spots.
-
May 01, 2013
01
May'13
What’s to be done about data breach discovery?
The time from first contact by cyber attackers to the victim learning of it is still measured in months and years, not hours and days
-
April 29, 2013
29
Apr'13
Another online firm hit by data breach
Online deals service LivingSocial is the latest company to report a breach of its computer systems that may mean attackers accessed customer details
-
April 25, 2013
25
Apr'13
Infosec 2013: Cyber crime challenges law enforcement
Cyber crime is forcing police and law enforcement agencies to re-think basic skills needed, according to experts at Infosecurity Europe 2013
-
April 25, 2013
25
Apr'13
Lib Dems will block Snoopers’ Charter, says Nick Clegg
The draft Communications Data Bill will not go ahead while the Lib Dems are in government, says deputy prime minister Nick Clegg
-
April 25, 2013
25
Apr'13
Spam SMS messages drop following ICO penalty
The number of spam SMS messages has significantly reduced since government regulator ICO issued £440,000 fines last year
-
April 22, 2013
22
Apr'13
Infosec 2013: University research challenges reliability of IPS
Research shows intrusion prevention systems (IPS) are not as effective at detecting malicious activity as some might think
-
April 22, 2013
22
Apr'13
Security spend misaligned with threats, says security veteran
Security budget allocations have remained the same for the past 15 years, but threats have changed, says Shlomo Kramer, chief executive at security firm Imperva
-
April 22, 2013
22
Apr'13
US jails LulzSec hacker Cody Kretsinger
The US has jailed a member of hacktivist group LulzSec for a year for his role in breaching computer systems at Sony Pictures Entertainment in 2011
-
April 19, 2013
19
Apr'13
Conficker makes way for web-based attacks, says Microsoft
Web attacks emerge as top threat as businesses finally begin to win the battle against Conficker and other worms, says Microsoft
-
April 15, 2013
15
Apr'13
Anonymous hacks North Korean websites for a second time
Members of the Anonymous hacktivist collective claim to have again hacked several prominent North Korean websites
-
April 15, 2013
15
Apr'13
Google reaches deal with EU competition authorities
Google has reportedly reached a deal with European Union (EU) competition authorities over concerns about its business practices
-
April 12, 2013
12
Apr'13
Google has another go at allaying EU competition concerns
Google has submitted a fresh set of proposals to address European concerns about its business practices and avoid punitive action
-
April 11, 2013
11
Apr'13
Bots and web apps among top threats to data security, says Check Point
Bots, viruses, breaches and attacks are a constant and real threat to the information security of organisations
-
April 11, 2013
11
Apr'13
Porn websites pose malware risk, says researcher
Browsing popular pornography internet sites pose a growing risk of malware infection, according to a security researcher
-
April 11, 2013
11
Apr'13
South Korea accuses North Korea of launching cyber attacks
South Korea blames North Korea for the cyber attacks that shut down thousands of computers at broadcasters and banks two weeks ago
-
April 03, 2013
03
Apr'13
Case Study: 192business switches to tokenisation to speed up business processes
Online payment card verification firm 192business uses tokenisation to speed up its processes and protect credit card details from fraud
-
April 03, 2013
03
Apr'13
US Army practises poor data security on mobile devices
Pentagon inspector general finds smartphones and tablets the US Army buys are not configured to protect sensitive data and allow remote wipe
-
April 03, 2013
03
Apr'13
Anonymous threatens to declare cyber war on North Korea
Anonymous hacktivist collective has threatened North Korea with cyber war if leader Kim Jong-un does not resign and install free democracy
-
April 02, 2013
02
Apr'13
Google closer to action from European privacy regulators
Google is another step closer to action by privacy regulators across Europe for failing to change the way it manages user data
-
March 27, 2013
27
Mar'13
UK government sets up cyber security fusion cell
A cyber security “fusion cell” for cross-sector threat data sharing aims to put government, industry and information security analysts side-by-side
-
March 26, 2013
26
Mar'13
Employees ignore security rules, say infosec pros
Most information security professionals believe corporate employees wilfully ignore security rules, survey at RSA Conference 2013 reveals
-
March 25, 2013
25
Mar'13
Malware in counterfeit software to cost business $114bn in 2013
Dealing with malware in counterfeit software will cost global enterprises an estimated $114bn in 2013, says research firm IDC
-
March 22, 2013
22
Mar'13
Six security issues to tackle before encrypting cloud data
Concern about security and privacy is likely to drive adoption of cloud encryption, but there are six security issues businesses should tackle
-
March 13, 2013
13
Mar'13
US authorities investigate hack of Michelle Obama and other high-profile people
US authorities are investigating hackers who allegedly stole financial information belonging to US first lady Michelle Obama
-
March 11, 2013
11
Mar'13
Phishing emails sent in pairs to lend authenticity, says training company
Phishing emails are now being deployed in pairs to create the illusion of authenticity, says security awareness training company PhishMe
-
March 11, 2013
11
Mar'13
Microsoft releases four critical security updates
Microsoft is to release four “critical” patches in its monthly Patch Tuesday security update, according to the advance notice.
-
March 06, 2013
06
Mar'13
What is RSA's build, buy, partner strategy?
Computer Weekly takes a closer look at RSA's build, buy, partner strategy
-
February 28, 2013
28
Feb'13
RSA 2013: Suppliers need to prepare for new security vulnerability handling standards
Software makers and online service providers need to prepare for two ISO standards on vulnerability handling processes due by the end of 2013
-
February 26, 2013
26
Feb'13
RSA 2013: Obama cyber order will have significant effect, says DoHS
President Barack Obama’s executive order on cybersecurity is a “very big deal” says Mark Weatherford, deputy under-secretary for cybersecurity at the US Department of Homeland Security (DoHS).
-
February 22, 2013
22
Feb'13
Music companies critical of Google’s anti-piracy efforts
Music companies have accused Google of failing to fulfil a pledge not to give prominent rankings in search results to websites offering illegal music downloads.
-
February 15, 2013
15
Feb'13
Bad outsourcing decisions cause 63% of data breaches
Bad outsourcing decisions nearly two-thirds of data breaches investigated by security firm Trustwave in the past year
-
February 06, 2013
06
Feb'13
EU cyber strategy aimed at boosting preparedness and cooperation
The European cyber security strategy addresses insufficient national preparedness and boosting co-operation in the region, says the EC
-
February 06, 2013
06
Feb'13
Business avoids cloud over fear of government snooping
Almost half of IT professionals are deterred from keeping sensitive data in the cloud because of fear of government intervention and possible legal action, a survey has revealed
-
February 06, 2013
06
Feb'13
Twitter strengthens login security after hacker attack
Days after a hacking attack, it has emerged that Twitter plans to strengthen its login security with two-factor authentication
-
January 28, 2013
28
Jan'13
Why has NAC, like DLP, failed to take off?
Why are organisations not investing in systems that are designed to keep malicious actors out of their networks?