IT security
-
News
18 Jul 2025
DWP accused of shielding AI deployments from public scrutiny
Amnesty International and Big Brother Watch say the Department for Work and Pensions’ ‘unchecked’ and opaque experimentation with AI in the UK’s social security system, which treats benefit claimants as automatically suspicious, is being shielded from public scrutiny Continue Reading
By- Sebastian Klovig Skelton, Data & ethics editor
-
News
17 Jul 2025
European cyber cops target NoName057(16) DDoS network
A Europol operation has succeeded in disrupting a pro-Russian hacktivist network accused of conducting DDoS cyber attacks on targets in Ukraine and Europe Continue Reading
By- Alex Scroxton, Security Editor
-
News
17 Sep 2012
IT security awareness needs to be company-wide, says (ISC)²
Information security awareness needs to be more robust, started as early as possible, continually reinforced and organisation-wide, says Julie Peeler, director, (ISC)² Foundation Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
17 Sep 2012
Static code analysis tools gain traction in India as SDL models mature
Static analysis tools are gaining popularity with Indian companies as software development models and perspectives mature. Here are some popular choices. Continue Reading
By- Varun Haran, Reporter
-
News
14 Sep 2012
Microsoft disrupts Nitol botnet, outs hidden PC malware
The Nitol botnet controlled more than 500 strains of embedded malware that Microsoft says has been plaguing the PC supply chain. Continue Reading
By- Robert Westervelt, TechTarget
-
News
13 Sep 2012
Government launches £3.8m cyber security institute
The government has ramped up moves to tackle growing cyber security threats by launching a £3.8m research institute. Continue Reading
By- Kathleen Hall, TechTarget
-
News
11 Sep 2012
Skills shortage means no unemployment in IT security, says (ISC)2
Zero unemployment in IT security shows a huge shortage of skills in the profession, says Hord Tipton, executive director of (ISC)2 Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Sep 2012
Gartner: Prepare for context-aware security
Cloud computing, IT consumerisation and the evolving threat landscape are forcing IT departments to rethink security Continue Reading
By- Cliff Saran, Managing Editor
-
Feature
10 Sep 2012
HDFC Bank’s ISO 27004-compliant security metrics a boost toward GRC
An ISO/IEC 27004-compliant metrics program is a rarity in the Indian infosec circuit. Indian BFSI major HDFC Bank’s ISMS has been there, done that Continue Reading
By- Varun Haran, Reporter
-
Photo Story
09 Sep 2012
DEF-CON Bangalore (DC9180) Meet Live
Get a front row view of the action-packed goings on at DEFCON Bangalore 2012 in this Live photo feature. Continue Reading
By- SearchSecurity.in Staff
-
News
07 Sep 2012
UK cookie law compliance mixed, study finds
Three months after the enforcement of the cookie law, only 12% of UK websites have prominent privacy notices and robust cookie controls, a study shows Continue Reading
-
Feature
05 Sep 2012
Setting up a botnet is easier than you think
Acquiring, installing, configuring and using a powerful data-stealing banking Trojan toolkit is not as difficult as it sounds Continue Reading
By- Warwick Ashford, Senior analyst
-
News
05 Sep 2012
FBI denies link to leaked Apple device codes
The FBI says there is no evidence that Anonymous gained access to 12 million identity codes for Apple devices by hacking an FBI agent's laptop Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Sep 2012
Anonymous claims a million Apple IDs in FBI breach
Hacking group Anonymous claims to have released over a million Apple Unique Device Identifiers (UDIDs) obtained from breaching FBI networks Continue Reading
-
News
03 Sep 2012
Personal mobile policies lacking in IT
Just 23% of IT departments in the UK have a strategy for managing the use of personal devices on their corporate networks, according to new research Continue Reading
By- Jennifer Scott, TechTarget
-
News
03 Sep 2012
Powerful cyber attack tools widely available, say researchers
More low-level cyber criminals are getting access to sophisticated attack tools, say cyber intelligence specialists Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Sep 2012
Advanced cyber-security intelligence
Analysts Bob Tarzey and Clive Longbottom look at the business case for rolling out next security information and event management tools. Continue Reading
-
News
03 Sep 2012
Cyber Vulnerability Index
What does your online corporate profile reveal? With so many cyber attacks in the news recently, executives are becoming increasingly concerned about their organisation’s exposure to hackers. Continue Reading
-
Opinion
31 Aug 2012
How to survive a data breach
Six practical tips on how to prepare for and survive a data breach Continue Reading
By- Conrad Constantine
-
Photo Story
31 Aug 2012
Adopting BYOD culture sans chaos: An Indian perspective
The bring your own device (BYOD) concept is changing security and cost paradigms. We look at BYOD considerations for Indian businesses in this series. Continue Reading
By- SearchSecurity.in Staff
-
News
31 Aug 2012
Businesses worldwide fail to prepare for cyber threats, says Kaspersky Lab
Companies around the world have failed to address cyber threats, according to a survey from security organisation Kaspersky Lab Continue Reading
By- Warwick Ashford, Senior analyst
-
News
30 Aug 2012
Amazon Appstore opens Android to attack
Amazon is urging users to switch off a safety feature in Android which prevents rogue apps from being downloaded, to install its Appstore software Continue Reading
By- Cliff Saran, Managing Editor
-
News
24 Aug 2012
VMware users can protect against virtual machine malware, says Trend Micro
New malware that attacks VMware virtual machines is no cause for undue concern, but users can take basic steps to protect data, says Trend Micro Continue Reading
By- Warwick Ashford, Senior analyst
-
News
22 Aug 2012
SCC becomes first supplier to win G-Cloud security accreditation
IT infrastructure company SCC has become the first supplier on the government’s CloudStore to win pan-government security accreditation. Continue Reading
By- Kathleen Hall, TechTarget
-
News
21 Aug 2012
At least 9 out of 10 top mobile apps hacked, study shows
An average of 96% of the top 100 paid mobile apps have been hacked, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
News
20 Aug 2012
More than 1,000 school application details leaked on the internet
Personal information about more than 1,000 children has been published on the UK Independent Schools Guide website after an alleged cyber attack Continue Reading
-
News
17 Aug 2012
Cyber security boot camp to educate potential cyber spooks
A group of about 30 young people will attend a cyber security boot camp announced by the organisations responsible for the Cyber Security Challenge next month. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
Tip
14 Aug 2012
Mobile application security issues and threat vectors in enterprises
As mobile application security threats take on serious proportions, we explore the issues and risks involved for users and enterprises. Continue Reading
By- Ram Venkatraman
-
News
08 Aug 2012
Good data protection can be cheap and easy, says ICO
The ICO says charities and third sector organisations stand to benefit most from a data protection check-up. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Aug 2012
LinkedIn data breach costs more than $1m
LinkedIn says the forensic investigation and other recovery costs of the data breach in June could have topped $1m. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 Aug 2012
RBS computer problem costs £125m
Royal Bank of Scotland will pay £125m in costs related to computer problems in June that meant customers could not access funds Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
E-Zine
01 Aug 2012
Compliance and risk
Compliance and risk managers have to overcome many challenges as a result of the data protection framework. This exclusive resource discusses some of the difficulties the European Union has to face because of regulations. Continue Reading
-
News
31 Jul 2012
Cyber threats affect banks worldwide
Nearly a quarter of the world's banks were hit by security breaches in the past year, a study shows Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
27 Jul 2012
Cybergeddon: Pictures from the digital crime thriller
CSI creator Anthony E. Zuiker, brings to life the growing threat of cybercrime Continue Reading
By- Caroline Baldwin, Freelance editor and journalist
-
News
27 Jul 2012
Twitter users targeted by Blackhole malware
Twitter users are being targeted by tweets containing malicious links that claim recipients are pictured in an online photo Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Jul 2012
SQL injection attacks rise sharply in second quarter of 2012
SQL injection (SQLi) attacks were up 69% in the second quarter of 2012 compared with the previous quarter, warns cloud hosting firm FireHost Continue Reading
By- Warwick Ashford, Senior analyst
-
News
26 Jul 2012
Australian telco AAPT confirms Anonymous data breach
Australian telecoms firm AAPT confirms business customer data was breached by hacktivist group Anonymous at an external service provider Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 Jul 2012
Customers urged to boycott CSC over CIA 'torture flights'
CSC customers are being urged to boycott the supplier over allegations that it took part in illegal CIA rendition flights in the US "war on terror" Continue Reading
By -
News
25 Jul 2012
Siemens issues software fix to protect against Stuxnet
German engineering firm Siemens has issued a fix for the software vulnerabilities in its programmable logic controllers that were exploited by the computer virus Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
24 Jul 2012
Nine must-have OSINT tools
Open source intelligence tools aid in target discovery during the reconnaissance phase. Here are nine must-have OSINT tools for finding maximum target info. Continue Reading
By- Karthik Poojary, Amazon
-
News
19 Jul 2012
Many global firms unaware of online risk, finds KPMG
Many global organisations could do a lot more to protect their private data and reduce exposure to attacks by hackers, according to KPMG Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2012
Security researchers join forces to bring down Grum botnet
Security researchers have collaborated to take down Grum, the world’s third-largest botnet of hijacked computers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
19 Jul 2012
Government-sponsored hackers target commercial secrets
Government-sponsored organisations are increasingly turning to hacking techniques to steal commercial secrets from businesses, KPMG has warned Continue Reading
By- Bill Goodwin, Investigations Editor
-
News
17 Jul 2012
Skype works to fix privacy bug as instant messages leak
Internet telephony service Skype has confirmed that a bug in its software has been sending copies of instant messages to unintended recipients Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
17 Jul 2012
A free risk assessment template for ISO 27001 certification
Risk assessment is the first important step towards a robust information security framework. Our simple risk assessment template for ISO 27001 makes it easy. Continue Reading
By- Sanil Nadkarni, Capitas
-
News
16 Jul 2012
Sophos combines endpoint security and UTM
Security firm Sophos combines endpoint protection and unified threat management (UTM) products into a single physical or virtual appliance Continue Reading
By- Warwick Ashford, Senior analyst
-
Feature
16 Jul 2012
Best practice in outsourcing security
The issues CIOs must consider in balancing security needs and budgetary constraints Continue Reading
By- Warwick Ashford, Senior analyst
-
News
13 Jul 2012
Outsourcing the problem of software security
This report from analyst group Quocirca assess the benefits of using on-demand services to ensure security throughout the application life cycle. Continue Reading
-
News
12 Jul 2012
Metropolitan Police gears up to analyse smartphone evidence
The Metropolitan Police plans to build a computer system to analyse photo and video evidence gathered from the public using mobile phones Continue Reading
By- Warwick Ashford, Senior analyst
-
Opinion
11 Jul 2012
The history of the next-generation firewall
Security expert Rik Ferguson explains how next-generation firewalls were developed and what protection they provide businesses. Continue Reading
By- Rik Ferguson
-
News
10 Jul 2012
Microsoft repairs dangerous XML Core Services zero-day flaw
The Microsoft XML Core Services vulnerability is being actively targeted by cybercriminals. In addition, Microsoft issued a critical update to Internet Explorer 9. Continue Reading
By- Robert Westervelt, TechTarget
-
Opinion
09 Jul 2012
Tackling the challenges of the next-generation firewall
Security expert Brian Honan shares top tips on installing and maintaining a next-generation firewall Continue Reading
By- Brian Honan
-
News
09 Jul 2012
Google Android OS Trojan virus hits 100K devices in China
Trojan malware has hit 100,000 devices using the Google Android operating system (OS) in China, say security researchers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
06 Jul 2012
Virus could cut 20,000 UK computers from web on Monday, FBI warns
The DNS Changer virus could cause 20,000 computers in the UK – of 350,000 worldwide - to lose web access on 9 July, the FBI has warned Continue Reading
By- Warwick Ashford, Senior analyst
-
News
04 Jul 2012
BT extends cyber security agreement with MoD
BT is to extend its cyber security agreement with the Ministry of Defence (MoD) in a deal to expand its cyber defence service Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 Jun 2012
Cyber Risk Perceptions: An Industry Snapshot
Concerns about cyber-risks in business have increased over the past 12 months, this snapshot survey from Marsh and Chubb reveals. Continue Reading
-
Photo Story
28 Jun 2012
The technology behind the Wimbledon tennis championships
We venture into the IBM bunker to see the IT operation behind the world's most famous tennis tournament. Continue Reading
By- Bryan Glick, Editor in chief
-
News
27 Jun 2012
White House cyber security coordinator Howard Schmidt joins Qualys
Former White House cyber security coordinator Howard Schmidt is to join the board of security and compliance company Qualys Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2012
Network security: Is new technology bypassing traditional controls?
Network security practices are among the most mature, but can businesses be sure network traffic is not sneaking past traditional controls? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2012
RBS set to sue supplier CA Technologies for software failure
Reports claim RBS is gearing up for legal action against US software supplier CA Technologies over the technical fault that crashed accounts Continue Reading
By- Jennifer Scott, TechTarget
-
News
27 Jun 2012
FTC sues Wyndham Worldwide hotel group over data breaches
The US Federal Trade Commission (FTC) is suing hotel group Wyndham Worldwide over claims it failed to secure customer data Continue Reading
By- Warwick Ashford, Senior analyst
-
News
27 Jun 2012
Six arrested in the UK in worldwide FBI-led credit card data sting
Six people in the UK and 12 in the US arrested in an FBI-led sting operation that netted a total of 24 credit card cyber fraudsters in 13 countries Continue Reading
By- Warwick Ashford, Senior analyst
-
Answer
26 Jun 2012
Techniques for preventing a brute force login attack
A brute force login attack can enable an attacker to log in to an application and steal data. Rob Shapland explains how to prevent brute force attacks. Continue Reading
By -
News
25 Jun 2012
Web surfers keen to compromise own privacy, study finds
Web users voluntarily compromise their own privacy by typing more personal information into online forms than is needed, a study has found Continue Reading
By- Warwick Ashford, Senior analyst
-
News
21 Jun 2012
RBS and NatWest online services unavailable
Some Royal Bank of Scotland (RBS) and NatWest Bank customers cannot access online services as the banking group experiences a computer problem. Continue Reading
By- Karl Flinders, Chief reporter and senior editor EMEA
-
News
19 Jun 2012
CISM and CRISC named as highest earning IT qualifications
IT Skills and Certifications Pay Index places two ISACA qualifications at the top of the highest-earning IT certifications list Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
18 Jun 2012
Ethiopian government blocks Tor Network online anonymity
The Ethiopian government is blocking access to the Tor Network that enables online anonymity, according to Reporters Without Borders Continue Reading
By- Warwick Ashford, Senior analyst
-
News
15 Jun 2012
Data Protection Masterclass: Global Privacy
This presentation from international law firm, Morrison and Foerster offers guidance to companies attempting to navigate privacy regulations in multiple jurisdictions. Continue Reading
-
Tutorial
13 Jun 2012
Maltego user guide part 2: Infrastructural reconnaissance
This part of our Maltego tutorial details how you can use the multi-faceted tool for infrastructural aspects of information gathering. Continue Reading
By- Karthik Poojary, Amazon
-
Tip
12 Jun 2012
Risk management for cloud computing deployments
Cloud risk management involves more than meets the eye. Our expert details risk management for public cloud setups in this multi-part series. Continue Reading
By- Narendra Sahoo, Vista Infosec
-
News
12 Jun 2012
2012: Will this be the year TPM finally comes of age?
Will 2012 be the year that TPM finally delivers on its potential to provide a hardware-based "root of trust" for enterprise information security? Continue Reading
By- Warwick Ashford, Senior analyst
-
News
11 Jun 2012
Flame malware gets kill command
The controllers of Flame, the most powerful cyber weapon discovered to date, have recently sent a kill command that removes the malware from some infected computers Continue Reading
By- Warwick Ashford, Senior analyst
-
News
08 Jun 2012
eHarmony, Last.fm join LinkedIn with password leaks
Online dating site eHarmony and Last.fm have joined LinkedIn with password leaks, as hackers focus on social networks Continue Reading
By- Warwick Ashford, Senior analyst
-
News
07 Jun 2012
Enabling rapid and effective IT recovery
This report from analyst, Freeform Dynamics, offers 7 key enablers of effective IT disaster recovery for IT department's in small and medium companies. Continue Reading
-
News
06 Jun 2012
Top 10 tips for IPv6 security
Many organisations are being misled about the complexities surrounding IPv6 security, according to security firm Stonesoft Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
06 Jun 2012
Royal Signals ‘Unsung Heroes’ Awards
IT experts from the Royal Signals were rewarded for their support and commitment to the service during an event for "unsung heroes" at Mansion House. Continue Reading
By- Kayleigh Bateman, Computer Weekly
-
News
06 Jun 2012
Majority of UK websites fail to comply with cookie law
Most UK websites are not yet compliant with the newly enforced cookie law, a study has revealed Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
01 Jun 2012
13 Android security apps
Keep your Android mobile device secure with our recommendations for Android security apps. Use these must-have 13 Android security apps and sleep easy. Continue Reading
By- Karthik Poojary, Amazon
-
News
01 Jun 2012
Former MI5 boss loses laptop
The former boss of the UK's MI5 security service has caused a security scare by losing her laptop at Heathrow. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
29 May 2012
BT helps itself to Home Hubs for public Wi-Fi
A feature of BT's routers called Fon gives away a percentage of bandwidth from home-based Wi-Fi to passers-by, often without user consent. Continue Reading
By- Jennifer Scott, TechTarget
-
News
28 May 2012
Security researchers discover powerful cyber espionage weapon 'Flame'
Security researchers have discovered a cyber espionage weapon, dubbed 'Flame', with a functionality greater than any other known threat Continue Reading
By- Warwick Ashford, Senior analyst
-
News
28 May 2012
UK regulator PhonepayPlus shuts down Angry Birds smartphone scam
UK users of Android smartphones have been targeted by premium-rate phone scams masquerading as popular apps such as Angry Birds Continue Reading
By- Warwick Ashford, Senior analyst
-
News
25 May 2012
Video: ICO publishes new guidance on cookie law
The Information Commissioner's Office (ICO) has published new guidance on cookie law and revealed the organisations it has approached on the issue Continue Reading
By- Warwick Ashford, Senior analyst
-
Video
24 May 2012
Screencast: Employ the FOCA tool as a metadata extractor
Mike McLaughlin demos the FOCA tool as a metadata extractor to expose the 'hidden' data users often post on their own websites. Continue Reading
-
News
21 May 2012
Global software piracy increasing rapidly, study shows
Global software piracy is increasing rapidly in the absence of any effective deterrence, a survey has revealed. Continue Reading
-
Answer
18 May 2012
File upload security best practices: Block a malicious file upload
Do your Web app users upload files to your servers? Find out the dangers of malicious file uploads and learn six steps to stop file-upload attacks. Continue Reading
By -
News
18 May 2012
Mobile threats demand focus on data protection, says Websense
Business needs to focus on data protection as cyber criminals turn to mobile malware, says Websense. Continue Reading
-
News
18 May 2012
MDM, security vendors scramble to address BYOD security issues
Organisations are looking beyond NAC and MDM to resolve BYOD security issues; MDM, security and hybrid vendors are responding with new products. Continue Reading
By- Tracey Caldwell, Contributor
-
Tip
17 May 2012
Information security budgets: Five steps to obtain management buy-in
Getting management to approve security budgets is difficult. Here are guidelines to help you prepare and present information security budgets effectively. Continue Reading
By- Sanil Nadkarni, Capitas
-
News
17 May 2012
The Pirate Bay is latest site to be hit by DDoS attack
The Pirate Bay has become the latest high-profile website to be hit by a distributed denial-of-service (DDoS) attack Continue Reading
By- Warwick Ashford, Senior analyst
-
Tip
17 May 2012
Maltego tutorial - Part 1: Information gathering
Maltego is a powerful OSINT information gathering tool. Our Maltego tutorial teaches you how to use Maltego for personal reconnaissance of a target. Continue Reading
By- Karthik Poojary, Amazon
-
Tip
14 May 2012
POS terminal security: Best practices for point of sale environments
Securing point of sale (POS) environments can be tricky. Shobitha Hariharan and Nitin Bhatnagar share comprehensive POS terminal security best practices. Continue Reading
By- Shobitha Hariharan & Nitin Bhatnagar
-
News
11 May 2012
Court stops Dutch party sharing Pirate Bay links
A court in The Hague has ordered a political party in the Netherlands to stop publicising ways to get around blocks to Swedish file-sharing site, The Pirate Bay Continue Reading
By- Warwick Ashford, Senior analyst
-
News
10 May 2012
Cyber attackers increasingly targeting applications, research shows
Web and mobile applications are the new frontiers in the war against cyber attack, according to an HP cyber security risks report Continue Reading
By- Warwick Ashford, Senior analyst
-
News
09 May 2012
Government snooping plans unveiled
The Queen's Speech has revealed that the government still plans to make it easier for security and police services to spy on e-mails, phone calls and internet activity Continue Reading
By- Warwick Ashford, Senior analyst
-
Tutorial
09 May 2012
Burp Suite Tutorial PDF compendium: WebApp tester’s ready reference
Our Burp Suite tutorial PDF compendium is a collection of our Burp Suite guides in PDF format made available to you for free offline reference. Continue Reading
By- SearchSecurity.in Staff
-
News
04 May 2012
UK to expand cyber info-sharing hub after initial success
A public/private cyber security initiative exposed a campaign of malicious emails targeting UK defence companies, Cabinet Office minister Francis Maude has revealed. Continue Reading
By- Warwick Ashford, Senior analyst
-
News
03 May 2012
Microsoft to fix 23 vulnerabilities in May 2012 Patch Tuesday
Microsoft said it plans to address flaws in Windows, Office, Silverlight and the .NET Framework. Continue Reading
By- SearchSecurity.com Staff
-
News
03 May 2012
SOCA takes its website offline in DDoS response
Just days after SOCA shut down carder sites, the agency was the victim of a DDoS attack, leading SOCA to takes its website offline. Continue Reading
By- Jane Wright, TechTarget
-
Photo Story
03 May 2012
11 security audit essentials
IT security audit tools automate the IT security audit process, making it more efficient and effective. Here are 11 must-have IT security audit tools. Continue Reading
By- Karthik Poojary, Amazon
-
News
02 May 2012
US to legislate to protect Facebook passwords from employers
The US is planning legislation that will protect Facebook passwords from prying employers Continue Reading
By- Warwick Ashford, Senior analyst
-
Photo Story
30 Apr 2012
InfoSecurity Europe: Odd Bugs
A selection of photos showing how far exhibitors will go to get people to their stands at InfoSecurity Europe 2012... Continue Reading
By- Cliff Saran, Managing Editor