Privacy and data protection
-
News
25 Apr 2024
Zero trust is a strategy, not a technology
Zero-trust security should be seen as a strategy to protect high-value assets and is not tied to a specific technology or product, says the model’s creator John Kindervag Continue Reading
-
News
24 Apr 2024
TikTok ban sails through US Senate
A law that will ban TikTok in the US unless its owner sells up pronto passed the US Senate by a landslide majority after being included in a package of military aid Continue Reading
-
News
06 Jan 2016
UK IoT research hub opens with support from academic world
A consortium of nine UK universities have come together to work alongside the Engineering and Physical Sciences Research Council on research into the internet of things Continue Reading
-
News
06 Jan 2016
Upgrade to Internet Explorer 11 to reduce risk
Failure to update to the latest version of Internet Explorer by 12 January 2016 could put users at risk, Microsoft warns Continue Reading
-
Feature
05 Jan 2016
Interview: James Bamford on surveillance, Snowden and technology companies
Investigative journalist and documentary maker James Bamford was among the first to uncover the secrets of the US National Security Agency and its global surveillance Continue Reading
-
News
31 Dec 2015
Top 10 internet of things stories of 2015
2015 was the year the internet of things began to move from theory to widespread practice, and the fledgling industry shook off the millstone of connected kitchen appliances Continue Reading
-
News
24 Dec 2015
Top 10 IT security stories of 2015
Computer Weekly looks back at the most significant stories on IT security in the past 12 months Continue Reading
-
News
23 Dec 2015
Top 10 cyber crime stories of 2015
Computer Weekly takes a look back at the top cyber crime stories of 2015 Continue Reading
-
E-Zine
16 Dec 2015
Cloud IT is helping Uefa meet its goals
In this week’s Computer Weekly, we find out how cloud computing is helping European football federation Uefa with preparations for the Euro2016 tournament. We ask if UK government moves to support IT education are enough to bridge the skills gap. And we examine the new international standard for personal data privacy in the cloud and what it means for suppliers. Read the issue now. Continue Reading
-
News
15 Dec 2015
Bracknell man arrested over VTech toy hack
Police have arrested a 21-year-old man in connection with the hacking of Hong Kong-based toymaker VTech Continue Reading
-
News
11 Dec 2015
Eight startups selected for Cyber London security accelerator programme
Cyber London has selected startups from the UK, Finland, Hungary, Israel, Brazil and South Africa for its second cyber security accelerator programme Continue Reading
-
News
11 Dec 2015
UK firms act quickly to fix payment card data encryption
Security firm found that 16 global companies had failed to effectively encrypt traffic to the payment portion of their websites and apps Continue Reading
-
Feature
10 Dec 2015
How to deal with the aftermath of a data breach
Considering that a data breach could happen to any company, at any time, a plan of action is the best tactic Continue Reading
-
Feature
07 Dec 2015
The next stage in quantum key distribution
Authentication schemes based on quantum physics are emerging to address the growing number of ways to compromise data traffic Continue Reading
-
Guide
07 Dec 2015
Essential guide to data breaches, the dark web and the hidden data economy
In this guide, we look at the aftermath of a data breach - what do cyber criminals use that stolen data for, and what can companies do to avoid becoming a victim? Continue Reading
-
News
04 Dec 2015
Wetherspoon pub chain warns customers of data breach
Discovery of a data breach at JD Wetherspoons comes hard on the heels of a breach at TalkTalk, underlining the importance of keeping customer data safe Continue Reading
-
News
03 Dec 2015
Veracode finds most web apps fail Owasp security check list
The findings of a report on critical vulnerabilities in most web applications is raising concerns over potential security vulnerabilities in millions of websites Continue Reading
-
News
03 Dec 2015
The US and China agree more steps to fight cyber crime
The US and China have made progress in expanding co-operation on cyber crime as China claims criminals and not state-backed hackers broke into the US Office of Personnel Management Continue Reading
-
News
03 Dec 2015
Workday ringfences support in Europe after Safe Harbour ruled unsafe
US cloud HR and financial services provider reponds to Safe Harbour failure by ringfencing European data Continue Reading
-
News
01 Dec 2015
Security analytics needs practical approach, says Fico Ciso Vickie Miller
Analytics must form part of a comprehensive defence-in-depth strategy, according to chief information security officer (Ciso) Vickie Miller at software firm Fico Continue Reading
-
News
26 Nov 2015
Use legal protection to soften cyber attack impact, says Kemp Little
IT outsourcing provides an opportunity for businesses to transfer risk and recover losses from cyber attacks, says law firm Kemp Little Continue Reading
-
News
26 Nov 2015
Dridex banking Trojan regains strength to mount attacks on the UK
Fresh Dridex banking Trojan campaigns target the US, UK and France – despite a recent law enforcement takedown operation – warn security researchers Continue Reading
-
News
25 Nov 2015
Data breach hits Hilton Worldwide hotel chain
Hilton Worldwide says malware found its way onto point of sale (PoS) systems and enabled attackers to steal payment card information Continue Reading
-
News
24 Nov 2015
Defence review promises 1.2% of defence budget spend on technology
The government’s defence review highlights need for technology investment, innovative ideas and cyber security Continue Reading
-
News
20 Nov 2015
Five key strategies for IoT success
Companies need to be agile because in some IoT systems, it will be a question of the winner taking it all, according to Kent Eriksson, IoT business consultant at PTC Continue Reading
-
News
20 Nov 2015
Coalition of top tech firms opposes weakened encryption
Weakening security with the aim of advancing security simply does not make sense, a coalition of top tech firms tells US president Barack Obama Continue Reading
-
News
18 Nov 2015
Cyber security mindset needs to change, says report
Government organisations are prime targets for cyber attacks, leading to increased importance on robust information security, according to a report by Intel Security and the Digital Government Security Forum Continue Reading
-
News
12 Nov 2015
Three men charged over JP Morgan hacking and fraud
Exploiting the Heartbleed bug was one of the methods used by three men charged in connection with the theft of more than 100 million customer data records from financial institutions to carry out "pump and dump" fraud Continue Reading
-
News
11 Nov 2015
Snoopers’ charter will force ISPs to raise broadband prices
The Science and Technology Select Committee hears that ISPs may be forced to put up their service charges to cover the cost of retaining communications data, should the Investigatory Powers Bill become law Continue Reading
-
News
11 Nov 2015
Germany is finalising legislation to shore up CNI cyber security
Germany is working to ensure digital sovereignty through IT security legislation and negotiations on IT security regulations and transatlantic trade at a European Union level Continue Reading
-
News
10 Nov 2015
EU data protection official optimistic on successor to Safe Harbour
An EU data protection official says he is optimistic that an alternative to the Safe Harbour agreement will be found, but it will take work from both the US and the EU Continue Reading
-
Feature
06 Nov 2015
Avoiding security issues when recycling hardware
What are the options for the environmentally and ethically responsible recycling of end-of-life hardware, without compromising data security? Continue Reading
-
E-Zine
05 Nov 2015
CW Europe – November 2015
Cloud computing has huge benefits to businesses in Europe, but data protection rules have been different for organisations in different parts of Europe. This is about to change with the final version of the General Data Protection Regulation (GDPR) expected soon. All 28 EU member states will have one set of rules to follow. Continue Reading
-
News
04 Nov 2015
UAE recognises importance of cyber security, says official
Like the UK, the UAE federal government has identified the importance of creating an environment in which it is safe to do business online Continue Reading
-
News
03 Nov 2015
Theresa May proposes bulk data and internet tracking under the Investigatory Powers Bill
The home secretary has unveiled the draft Investigatory Powers Bill, which sets out the government's plans to collect data on UK citizens' internet use Continue Reading
-
News
02 Nov 2015
000Webhost blames PHP exploit for breach of 13.5 million records
Unencrypted passwords for a free web hosting firm were on sale for five months before customers were notified their records had been leaked, according to a security researcher Continue Reading
-
News
02 Nov 2015
Theresa May promises strong oversight in surveillance bill
The proposed Investigatory Powers Bill contains “very strong” oversight and “world-beating” authorisation procedures, according to home secretary Theresa May Continue Reading
-
News
30 Oct 2015
Law enforcement cracks down on DroidJack Android snooping malware users
A joint EU/US operation on the DroidJack malware is the latest example of international collaboration between law enforcement officers directed at cyber crime Continue Reading
-
News
29 Oct 2015
M&S data breach forces retailer to temporarily suspend service
A glitch that allowed online customers to see each others' details forced retailer Mark & Spencer to take its website offline while it resolved the issue Continue Reading
-
E-Zine
26 Oct 2015
Blockchain sparks change in banking industry
In this week's Computer Weekly, we find out why blockchain, the technology that underpins bitcoin, is making waves in the banking sector. EasyJet tells us why digital is increasingly important for airlines. And we look at the forces driving digital disruption and why some sectors are changing faster than others. Read the issue now. Continue Reading
-
News
23 Oct 2015
TalkTalk warns customers about personal data breach
TalkTalk has warned customers their personal data may have been compromised in the second cyber attack on the firm in 2015, with some data left unencrypted Continue Reading
-
News
22 Oct 2015
Police and industry to tackle cyber crime together, says TechUK
A TechUK report calls for collaboration between police and industry to raise standards of reporting, recording and responding to cyber crime Continue Reading
-
News
21 Oct 2015
Infosec pros should start preparing for the future, say experts
Information security professionals need to grow their skills, engage with the business, increase security awareness, set business goals and tailor their messages, says a panel of experts Continue Reading
-
News
19 Oct 2015
Dow Jones denies it was target of insider trading hack
Dow Jones says there is no information to support reports that it was the target of hackers seeking information for insider trading Continue Reading
-
News
16 Oct 2015
Yahoo announces password-killing Account Key
Yahoo Account Key uses push notifications to provide a fast and secure way to access Yahoo accounts from a mobile device Continue Reading
-
Feature
15 Oct 2015
The true cost of a cyber security breach in Australia
The costs of cyber security breaches can quickly add up with fines, reputational damage and overhauls to network security all hitting the coffers. The case of one Australian firm shows why paying a ransom to a hacker might be tempting. Continue Reading
-
News
13 Oct 2015
Cyber security innovation is crucial, says security evangelist
Visibility and automation are key areas of cyber security innovation, but firms should concentrate first on the basics and not overlook the human element of security Continue Reading
-
News
12 Oct 2015
NHS Health Apps Library to close
The NHS Health Apps Library is shutting down after a two-year tenure, shortly after NHS-approved apps were found to leak data Continue Reading
-
E-Zine
12 Oct 2015
Europe's data privacy shake-up
In this week's Computer Weekly, after the European Court of Justice ruled the Safe Harbour agreement invalid, we assess the implications for transatlantic data protection. We find out why DVLA has brought its IT back in-house after a 13-year outsourcing deal. And we look at the role of IT in cutting costs in the NHS. Read the issue now. Continue Reading
-
Feature
09 Oct 2015
The security dangers of home networks
Most companies take reasonable steps to protect their networks from virus attacks, but one area of vulnerability that is often overlooked is infection from employees’ home networks Continue Reading
-
Feature
09 Oct 2015
How to ensure strong passwords and better authentication
Five steps to ensure stronger passwords and better authentication to reduce the threat of business data theft Continue Reading
-
News
09 Oct 2015
Apple removes more iOS apps over security concerns
Apple has blocked more apps over security concerns just weeks after ridding the App Store of XcodeGhost malware Continue Reading
-
News
08 Oct 2015
Samsung Pay isolated from LoopPay attack
Hackers who compromised LoopPay’s computer systems had no access to Samsung Pay’s user data or other core information, says Samsung Continue Reading
-
News
07 Oct 2015
Singapore and UK researchers investigate privacy in big data era
Academic organisations in Singapore and the UK collaborate on the privacy questions raised by big data and the cloud Continue Reading
-
Feature
06 Oct 2015
Max Schrems: The man who broke Safe Harbour
Schrems has persuaded a high court judge to confirm that Edward Snowden’s evidence is acceptable in court and that the US is engaged in mass surveillance of European citizens Continue Reading
-
News
06 Oct 2015
Researchers find credential-stealing webmail server APT attack
Security researchers have discovered a new and unique advanced persistent threat (APT) technique that involves a malicious module loaded onto a webmail server Continue Reading
-
News
05 Oct 2015
Facebook ruling not only landmark data protection case in Europe, say experts
A landmark ruling against Slovakia-based website Weltimmo could impact the Max Schrems case against Facebook and new European data protection rules currently being finalised Continue Reading
-
News
02 Oct 2015
David Jones online customers hit by data breach
Hackers have accessed the personal details of an unknown number of David Jones online customers, but the retailer says payment details and passwords are not affected Continue Reading
-
News
30 Sep 2015
Medical devices must be secure by design, say industry experts
The information security industry is calling for medical device manufacturers to design and build cyber security into all internet-enabled devices after thousands are found to be hackable Continue Reading
-
News
29 Sep 2015
120-day patching gap puts many firms at risk of cyber attack, study shows
The probability of a vulnerability being exploited hits 90% between 40-60 days after discovery, but many firms are taking up to 60 days beyond that to patch, while others are failing to patch at all, a study shows Continue Reading
-
Feature
25 Sep 2015
How to fully test IT networks for vulnerabilities
Making sure a company network is secure is a very important task, and one that should be scheduled regularly Continue Reading
-
News
22 Sep 2015
Is Microsoft Office 2016 reliable enough for business?
A day after a major Skype outage, Microsoft unveils Office 2016, which, ironically, offers tight integration with Skype Continue Reading
-
News
21 Sep 2015
Department for Culture, Media and Sport takes over responsibility for data protection policy
Government transfers responsibility for data protection policy and ICO oversight from Ministry of Justice (MOJ) to Department for Culture, Media and Sport (DCMS) Continue Reading
-
News
21 Sep 2015
Health chief 'should be held to account' for whistleblow errors
Former nurse and clincial commissioner Bernie Rochford claims unfair dismissal after blowing the whistle on IT problems which put patient care at risk Continue Reading
-
News
16 Sep 2015
BT launches ethical hacking service for bankers
BT introduces a certified Crest Star ethical hacking test service for financial services customers Continue Reading
-
News
15 Sep 2015
Most DDoS attacks hiding something more sinister, Neustar warns
Smaller DDoS attacks can be more dangerous than a powerful attack that knocks a company offline but does not install malware or steal data, warns Neustar Continue Reading
-
News
15 Sep 2015
NHS trust denies bullying and intimidation of IT whistleblower
Managers were already aware of whistleblower's concerns about the accuracy of NHS Southwark's data, tribunal hears Continue Reading
-
News
14 Sep 2015
RSA Group flags ID theft risk to Lloyds Bank customers following datacentre storage theft
International insurance group has seen 500 customers take up offer of identity theft protection in wake of datacentre theft Continue Reading
-
News
11 Sep 2015
Security industry welcomes GCHQ password guidelines
GCHQ's guidance on password policy covers some of the most pressing issues facing UK businesses and employees today, according to Skyhigh Networks Continue Reading
-
News
10 Sep 2015
US health insurer Excellus BlueCross BlueShield hit by data breach
Forensic investigation reveals a data breach at US health insurer Excellus BlueCross BlueShield exposing up to 11 million records 21 months after the first intrusion Continue Reading
-
News
10 Sep 2015
Cloudian boosts object storage HyperStore compliance features
Distributed object storage software maker Cloudian upgrades HyperStore with added granularity of data protection features that can help meet compliance requirements Continue Reading
-
News
09 Sep 2015
Security pros failing to address digital certificate risks, survey shows
Even though 90% of security professionals believe a leading CA will be compromised in next two years, only 13% have existing automation to deal with that happening Continue Reading
-
News
09 Sep 2015
Conventional security measures hit productivity, study shows
Most IT professionals say context-aware security would improve productivity without compromising security, a survey from Dell reveals Continue Reading
-
News
09 Sep 2015
Security vulnerability management more than patching, warns Secunia
Keeping track of what makes an IT environment vulnerable is an ongoing and complex task, according to Secunia Continue Reading
-
News
04 Sep 2015
US State Department plans cyber security playbook
The US State Department issues a request for information to determine the capabilities of commercial industry to provide and maintain a cyber security playbook Continue Reading
-
News
01 Sep 2015
Use 2FA to mitigate KeyRaider iOS malware, says Rapid7
KeyRaider iOS malware targeting iPhone users in China and 17 other countries including the UK has raised enterprise security concerns Continue Reading
-
News
28 Aug 2015
Police arrest six UK teenagers for using DDoS cyber attack tool
Police arrest six UK teenagers on suspicion of using a DDoS attack tool targeting a national newspaper, a school and online gaming companies and retailers Continue Reading
-
News
27 Aug 2015
Rapid7 calls on router makers to eliminate backdoors
Until manufacturers stop using default passwords, we will continue to see opportunistic attacks on home and small business routers, says Rapid7's Tod Beardsley Continue Reading
-
News
26 Aug 2015
Many firms not getting to grips with third-party data security risk
Supply chain data security risk is pervasive, but being unable to deal with it is down to basic failings, says a cyber risk expert Continue Reading
-
News
25 Aug 2015
Sans Institute identifies top UK cyber talent
The cream of UK cyber security talent selected from 24,000 candidates are set to begin eight weeks of intensive training in the first-ever intake at the Sans UK Cyber Academy Continue Reading
-
Opinion
25 Aug 2015
Life’s a breach: How to handle the press after a hacking attack
Emily Dent, specialist in crisis PR, offers some advice to organisations that unexpectedly find themselves in the headlines Continue Reading
-
News
24 Aug 2015
Spotify to update privacy policy after user protest
Some Spotify users are unhappy about new privacy policies that allow access to users’ photos, video, mobile device location, voice controls and contacts Continue Reading
-
News
21 Aug 2015
ICO orders Google to remove links to right to be forgotten takedowns
The Information Commissioner's Office (ICO) says Google must remove newer links that reveal the same details as previously removed links Continue Reading
-
News
20 Aug 2015
Broadband Stakeholder Group to review UK net neutrality policy
The Broadband Stakeholder Group commissions an independent review into the UK’s industry-led approach to net neutrality and the open internet Continue Reading
-
News
20 Aug 2015
Mumsnet suffers multi-vector cyber attack
Mumsnet has been hit by a DDoS attack, its admin hacked and data stolen, and then a hoax call sent armed police to the home of the organisation's co-founder, Justine Roberts Continue Reading
-
News
20 Aug 2015
Premiership Rugby scores security and efficiency with Intralinks
By setting access controls, Premiership Rugby can ensure that its partners get quick access only to role-appropriate content Continue Reading
-
News
17 Aug 2015
AT&T a key NSA partner in internet spying Snowden docs show
The NSA considered its relationship with AT&T to be unique and especially productive, leaked documents show Continue Reading
-
News
16 Aug 2015
Mobile phone users at risk as hackers bug and track victims
An investigation by Australian TV show 60 Minutes demonstrates how hackers based thousands of miles away in Germany were able to record the calls of an Australian senator and track his movements Continue Reading
-
News
11 Aug 2015
FBI uncovers cyber insider trading gang
Nine suspects are expected to be charged in the US with insider trading based on corporate press releases stolen by hackers before they had been made public Continue Reading
-
News
10 Aug 2015
BlackHat 2015: Industrial hacking - the untold story
Hackers have been penetrating industrial control systems for at least a decade for extortion, yet little is known about how they gain access Continue Reading
-
News
10 Aug 2015
Carphone Warehouse data breach hits 2.4 million UK customers
Carphone Warehouse confirms the authorities have been notified about the breach, and urges customers to take steps to protect themselves Continue Reading
-
News
03 Aug 2015
Why the time is ripe for security behaviour analytics
Recent months have seen an uptick in announcements by security suppliers around behavioural analytics, but what is driving this trend? Continue Reading
-
News
31 Jul 2015
Commercial software more secure than open source, finds report
A study has found that commercial code is more compliant than open source code with security compliance standards, such as the Owasp top 10 and the CWE top 25 Continue Reading
-
News
29 Jul 2015
A third of employees will sell company data if the price is right, study reveals
For £5,000, a quarter of employees polled said they would sell confidential company data, and risk both their job and criminal convictions Continue Reading
-
News
24 Jul 2015
Contactless card fraud highlights need for 2FA
A Which? report on contactless card fraud highlights the need for multi-factor authentication for payments, say security experts Continue Reading
-
News
22 Jul 2015
Jeep hack raises questions about responsibility for security
The hack of a Jeep raises the question whether users or car manufacturers should be responsible for protecting against cyber attackers Continue Reading
-
News
21 Jul 2015
Information security governance maturing, says Gartner
Increasing awareness of the impact of digital business risks, coupled with high levels of publicity regarding cyber security incidents, is making IT risk a board-level issue, says Gartner Continue Reading
-
News
20 Jul 2015
UK considers 10-year jail sentences for online piracy
The UK government is considering new measures to increase the sanctions for criminals who infringe the rights of copyright holders for large-scale financial gain Continue Reading
-
News
20 Jul 2015
Hackers threaten to expose ALM’s dating and cheating site users
A hacking group, calling itself The Impact Team, claims to have compromised Avid Life Media’s user databases, source code repositories, financial records and email system Continue Reading
-
News
17 Jul 2015
United Airlines begins bug bounty payouts
United Airlines has paid out the maximum award to two hackers, which means the flaws are likely to be remote code execution vulnerabilities Continue Reading
-
News
17 Jul 2015
UK man arrested for hacking into US government computers
Briton Lauri Love is accused of hacking into various US agencies, including the US army, Nasa, the federal reserve and the environmental protection agency Continue Reading
-
News
14 Jul 2015
Vodafone scheme to help SMEs get online
Vodafone is to trial a series of digital workshops for SMEs aimed at equipping them with a stronger online presence Continue Reading