Special focus: IT security

Laptop with various cables plugged in

There are myriad security challenges facing IT professionals today: personal computers that get hacked, viruses hijack machines, and keystroke loggers steal passwords which end up on public web sites. Yet the amount of security-critical transactions conducted on such systems is steadily increasing.

 

There are also mobile devices such as smartphones and tablet PCs, increasingly being used for critical transactions and projected to replace PCs as the web access device of choice. All these computing devices are in use in modern businesses and their effective management poses a growing challenge to the IT professional.

 

Selected it-security news

US considers sanctions for China and Russia over cyber-theft

US considers sanctions for China and Russia over cyber-theft

The USA may issue sanctions against firms and individuals from China and Russia believed to be behind cyber-attacks against US commercial targets, officials said.

Ashley Madison offers reward for info on hackers

Ashley Madison offers reward for info on hackers

Adultery website Ashley Madison is offering a 500,000 Canadian dollar reward for information on hackers who published its customers' details.

Second data dump in AshleyMadison hack

Second data dump in AshleyMadison hack

Founder of infidelity website AshleyMadison had his private emails leaked as part of the second data dump in the high-profile hacking case.

Thermal imaging iPhone accessory helps crack keypad codes

Thermal imaging iPhone accessory helps crack keypad codes

Criminals can use a readily available iPhone accessory that costs less than £200 to steal codes for push button security devices.

Phishing emails averaging at 20 a month, research reveals

Phishing emails averaging at 20 a month, research reveals

People receive up to 20 phishing emails a month, research shows, with many involving sophisticated mimics of government departments, banks and major companies.

IoT security risks ignored by enterprise systems

IoT security risks ignored by enterprise systems

More than two-thirds of IT professionals feel they are forced to adopt smart devices in spite of the security risks, a survey has found.

Security flaw in car immobiliser supressed for two years

Security flaw in car immobiliser supressed for two years

News of a major security flaw in a widely used car immobiliser system was suppressed for two years by Volkswagen (VW).

AshleyMadison personal user data exposed online

AshleyMadison personal user data exposed online

The personal data of more than a million users of the adultery website AshleyMadison.com have been leaked online by morality conscious hackers.

Cyber-security rules revived to control IT in Chinese banks

Cyber-security rules revived to control IT in Chinese banks

Cyber-security rules designed to prevent western IT technology being purchased by Chinese banks have been revived after being side-lined earlier this year.

Bank of England to query insurers cyber-protection

Bank of England to query insurers cyber-protection

The Bank of England is sending questionnaires to the UK's largest insurers to make sure they are properly protected against cyber-attacks.

Hacker admits compromising thousands of Facebook accounts

Hacker admits compromising thousands of Facebook accounts

One of the hackers behind online cyber-criminal forum Darkode has pleaded guilty to breaking into at least 77,000 computers, prosecutors said.

AT&T accused of helping NSA with Internet spying

AT&T accused of helping NSA with Internet spying

Telecoms provider AT&T has been helping the US National Security Agency conduct surveillance on Internet traffic, according to the New York Times.

Details of hacker insider trading scheme revealed

Details of hacker insider trading scheme revealed

Prosecutors have revealed the details of a scheme that saw stock traders and hackers team up to make as much as $100m in illegal profits over five years.

Insider trading hacker ring to be indicted today

Insider trading hacker ring to be indicted today

US prosecutors will announce charges later today against an insider trading ring that hacked disseminators of news releases, a source said.

Carphone Warehouse suffers major data breach

Carphone Warehouse suffers major data breach

Hackers may have stolen the personal details of as many as 2.4 million Carphone Warehouse customers.

Zigbee's wireless security flaws threatens IoT devices

Zigbee's wireless security flaws threatens IoT devices

The ZigBee wireless communications specification used by many Internet of Things (IoT) devices contains critical security flaws, IT firm Cognosec has claimed.

Russia prime suspect in cyber-attack on US military

Russia prime suspect in cyber-attack on US military

Russia has been named the prime suspect behind a cyber-attack on an unclassified email network of US military’s Joint Staff that forced the Pentagon last month to restrict access to portions of the network.

Google and Samsung agree regular Android security fixes

Google and Samsung agree regular Android security fixes

Google and Samsung will release monthly security fixes for Android phones, following the unveiling of the Stagefright bug in the mobile operating system.

China to place security teams in major Internet firms

China to place security teams in major Internet firms

China will set up "network security offices" at major Internet companies and websites as it tightens its grip over the domestic Internet.

Standard computer hacked to transmit data via sound

Standard computer hacked to transmit data via sound

Standard computer hardware has been hacked by a team of security researchers to send information out of an office through sound waves.

Cyber-security bill likely to be passed by US Senate

Cyber-security bill likely to be passed by US Senate

US senators will consider a bill this week that will make it easier for firms to share Americans' personal information with each other or the government.

Russians hackers used Twitter, photos to reach US computers

Russians hackers used Twitter, photos to reach US computers

Russian-backed hackers used Twitter posts combined with data hidden in photos to control US government and defence industry computers.

Stagefright Android bug 'worse than Heartbleed'

Stagefright Android bug 'worse than Heartbleed'

Hackers could access millions of Android-powered phones via a multimedia message due to a newly discovered vulnerability in the heart of Google’s operating system.

French council approves controversial surveillance bill

French council approves controversial surveillance bill

France’s Constitutional Council has ruled that a highly controversial bill that was introduced to allow government surveillance of terrorism suspects does not violate the country’s constitution.

MPs win snooping powers legal challenge

MPs win snooping powers legal challenge

Two Members of Parliament have won a High Court battle over the UK government’s emergency extension of surveillance powers.

Ex-employees probed in attack on Italian surveillance firm

Ex-employees probed in attack on Italian surveillance firm

Milan prosecutors are investigating six former employees of cybersecurity firm Hacking Team in connection with a massive hack of its systems that saw huge chucks of its code stolen.

Darkode hacking forum seized by authorities

Darkode hacking forum seized by authorities

The Darkode online forum used by cybercriminals around the world has been shut down by US authorities after an investigation carried out in 20 countries.

Victims of US government hack still not informed

Victims of US government hack still not informed

None of the 21.5 million Americans whose personal details were compromised in a hack of government databanks have been informed yet, say officials.

Security services have ‘a lot to fear over encryption’, report says

Security services have ‘a lot to fear over encryption’, report says

UK security services fear they could be locked out from the communications of potentially dangerous suspects due to sophisticated encryption tools, a report has warned.

Italian surveillance firm claims hack was by state actors

Italian surveillance firm claims hack was by state actors

A cyber-surveillance company believes a government may have been behind a massive hack of its systems that saw huge chunks of its code stolen.

21.5 million people hit in US data breach

21.5 million people hit in US data breach

Hackers stole social security identification numbers and other highly sensitive information from at least 21.5 million people, officials said on Thursday.

Swapping faces in photos could protect privacy online

Swapping faces in photos could protect privacy online

A Hertfordshire University researcher has proposed a privacy algorithm for social media that would automatically replace faces in photos with artificial ones, thus protecting people’s privacy online.

Middle-manager inaction the weak link in enterprise cyber-security

Middle-manager inaction the weak link in enterprise cyber-security

Lethargic, narrow-minded middle-managers are among the biggest remaining obstacles to consolidating enterprise cyber-security, an industry expert has warned.

Virtual Private Networks leak users’ data, study finds

Virtual Private Networks leak users’ data, study finds

Virtual Private Networks used to encrypt users’ information against surveillance and hacking could actually leak private data due to a newly discovered vulnerability.

Campaign calls for greater online protection for children

Campaign calls for greater online protection for children

Children are a click away from accessing pornography, violent videos and being exposed to cyber-bullying, an online child safety group has warned.

RBS promises £150m IT investment after major failure

RBS promises £150m IT investment after major failure

The Royal Bank of Scotland will invest £150m a year to improve resilience of its computer system after a major IT failure affected thousands of customers this week.

Canadian government web sites hacked in cyber attack

Canadian government web sites hacked in cyber attack

Several Canadian government websites and servers have been brought back online after they were taken down for several hours in a cyber-attack on Wednesday.

Thousands of apps leave data exposed to hackers

Thousands of apps leave data exposed to hackers

Thousands of smartphone applications including the most popular ones store users’ data online in a way that makes them easily accessible to hackers, say German cyber security researchers.

Chinese hackers suspected of stealing US government data

Chinese hackers suspected of stealing US government data

Chinese hackers are suspected of breaking in to US government computers and stealing data from at least four million federal workers, officials have said.

IT security 'should be pitched like other business enablers'

IT security 'should be pitched like other business enablers'

Enterprise information security chiefs could boost their chances of getting the funding they need by emulating sales and marketing budgeting practices, a security industry expert believes.

'Brainprint' signals proposed as unique human ID

'Brainprint' signals proposed as unique human ID

The unique way the brain of every person responds to certain words could be used for identification purposes instead of passwords, researchers have proposed.

'Cloud amnesty' would let IT provide secure alternatives

'Cloud amnesty' would let IT provide secure alternatives

Employers should offer an 'amnesty' to staff who secretly use cloud-based services for enterprise data, so that they can make known use of unsuitable and risky Web-based providers without fear of censure, according to an IT security expert.

Criminals ‘more likely to recruit online’ warns UK police director

Criminals ‘more likely to recruit online’ warns UK police director

Illegal downloading of music and film could lead to cyber-crime, a senior police officer has warned on Wednesday.

End to US data collection powers as Senate deal falls

End to US data collection powers as Senate deal falls

The legal authority for US intelligence agencies’ to bulk collect Americans’ phone records has expired, after the Senate failed to pass legislation to extend the deal.

China to bring out five-year cybersecurity plan

China to bring out five-year cybersecurity plan

China is believed to be preparing a five-year cybersecurity plan to protect state secrets and data, according to a report from China Daily on Thursday.

United Airlines to reward code debuggers with air miles

United Airlines to reward code debuggers with air miles

US flight operator United Airlines has launched a reward programme for security experts who reveal vulnerabilities in the software used on its web sites.

US House votes to end NSA bulk collection of phone data

US House votes to end NSA bulk collection of phone data

The US House of Representatives has voted to end the NSA’s bulk collection of American’s telephone data on Wednesday.

NSA ‘asked’ Germany’s BND to snoop on Siemens

NSA ‘asked’ Germany’s BND to snoop on Siemens

The US National Security Agency (NSA) wanted to spy on Siemens with the help of German intelligence, a German newspaper reported, in what could be a shaming episode for Chancellor Angela Merkel.

French parliament approves surveillance rules in counterterror move

French parliament approves surveillance rules in counterterror move

French lawmakers have approved a controversial law to let intelligence services use spying devices more easily, with the aim of preventing Islamist attacks.

WikiLeaks republishes hacked Sony Pictures documents

WikiLeaks republishes hacked Sony Pictures documents

Whistleblower site WikiLeaks has released a searchable database online of tens of thousands of emails and documents stolen by hackers in a cyber-attack on Sony Pictures Entertainment last year.

Planes could be hacked through in-flight entertainment system

Planes could be hacked through in-flight entertainment system

Airliners could be hacked mid-flight through passengers using the plane’s wireless entertainment system to access its flight controls, a US agency says.

Successful hacks and cyber attacks commonly result of human error

Successful hacks and cyber attacks commonly result of human error

A pair of reports released this week reveal that the vast majority of hacking attacks that threaten businesses are down to human error.

‘Sustained’ Chinese cyber-espionage campaign targeted Southeast Asia

‘Sustained’ Chinese cyber-espionage campaign targeted Southeast Asia

A decade-long cyber-espionage campaign against governments and businesses in Southeast Asia is likely of Chinese origin, says internet security firm FireEye.

Destructive hacking more common than previously thought

Destructive hacking more common than previously thought

Hacking attacks aimed at destroying data or manipulating industrial equipment are far more common than previously thought, according to a new survey.

Intelligence agencies at loggerheads with cyber criminals

Intelligence agencies at loggerheads with cyber criminals

UK intelligence agencies are engaged in a “technology arms race” with cyber criminals and other “malicious actors”, according to MI6 chief Alex Younger.

Encryption works in favour of terror suspects, says Europol chief

Encryption works in favour of terror suspects, says Europol chief

Tough encryption software used on mobile phones and in apps is the biggest challenge for security agencies tackling terrorism, according to Europol chief Rob Wainwright.

UK to get more cyber security students

UK to get more cyber security students

Students will get funding support through university if they choose a cyber-security related course as part of a new scheme, Cabinet Office minister Francis Maude said on Tuesday in the Commons.

Facebook’s new payment feature to attract hackers

Facebook’s new payment feature to attract hackers

The new feature of Facebook’s Messenger app allowing people to transfer money by a single tap of a button is likely to make the social network climb up the cyber-criminals' priority list, researchers have agreed.

UK intelligence agencies cleared of breaking surveillance laws

UK intelligence agencies cleared of breaking surveillance laws

UK’s security and intelligence agencies do not seek to bypass existing surveillance laws, but a tighter legislative framework is needed to protect privacy, a cross-party committee said in a landmark report.

Amateur cyber defenders could be recruited after mock cyber-attack

Amateur cyber defenders could be recruited after mock cyber-attack

A group of amateur cyber defenders have to investigate and fend off a simulated cyber terrorist plot and could lead to them gaining permanent jobs in the industry.

CIA’s decade-long quest to break iPhone security

CIA’s decade-long quest to break iPhone security

CIA was developing software to spy on iPhone and iPad users through apps distributed by Apple’s App store.

Hackers can spy on Londoners as public WiFi poorly protected

Hackers can spy on Londoners as public WiFi poorly protected

Millions of users connecting every day to public WiFi networks in the UK’s capital are putting their sensitive data at risks as more than a half of those wireless hotspots use weak protection hackable by ‘every IT college student,’ world’s leading cyber security firm said.

‘Immature’ Internet of Things hackable with primitive methods

‘Immature’ Internet of Things hackable with primitive methods

The emerging Internet of Things lags massively behind conventional computers in terms of cyber security with manufacturers failing to implement basic security practices, a researcher has demonstrated.

Europol prevents hackers from controlling millions of PCs

Europol prevents hackers from controlling millions of PCs

A group of hackers that infiltrated 3.2 million compromised computers all around the world to steal banking information has been stopped by European police and technology companies, officials said.

Tokenisation to allow Europe to join mobile payment revolution

Tokenisation to allow Europe to join mobile payment revolution

Visa Europe is to launch what it calls a tokenisation service providing better protection for mobile payment solutions.

Lenovo in row over adware that compromises user security

Lenovo in row over adware that compromises user security

The world’s biggest computer manufacturer has been forced to remove virus-like software from its laptops after customer backlash over potential security vulnerabilities.

US and UK blamed for hacking SIM card firm to access phones

US and UK blamed for hacking SIM card firm to access phones

US and UK intelligence agencies have allegedly hacked into a major maker of SIM cards, allowing them to eavesdrop on billions of mobile users around the world, a US news website claims.

Sophisticated snooping software exposed by Russian researchers

Sophisticated snooping software exposed by Russian researchers

Spying software that could eavesdrop on the majority of the world’s computers undetected has been identified by cyber researchers buried deep within hard drives made by top manufacturers.

Banks ‘lose $1bn’ in cyber-robberies, report says

Banks ‘lose $1bn’ in cyber-robberies, report says

A hacking network has stolen up to $1bn from more than 100 banks and financial institutions around the world in what would be an “unprecedented cyber-robbery”, claims a cyber-security firm.

Obama to discuss cybersecurity with tech giants

Obama to discuss cybersecurity with tech giants

President Barack Obama is holding a summit on cybersecurity and consumer protection on Friday with top industry figures, including Apple’s Tom Cook, to encourage companies to share more information about cybersecurity threats with the government.

Millions of records stolen from US health insurer Anthem after cyber-attack

Millions of records stolen from US health insurer Anthem after cyber-attack

Hackers have stolen troves of data including names, birthdays and social security numbers from up to 80 million people in a cyber-security breach against Anthem, the US’ second-largest health insurer, it was announced.

Tackling emissions and cyber threat priorities of Obama’s budget

Tackling emissions and cyber threat priorities of Obama’s budget

The $3.99 trillion 2016 budget proposal of the US President Barack Obama, announced on Monday, includes $14bn for cyber-security as well as a new $4bn fund to facilitate the US transition to cleaner energy.

Linux makers update software to stop ‘Ghost’ cyber threat

Linux makers update software to stop ‘Ghost’ cyber threat

A number of manufacturers of the Linux operating system, including Red Hat, updated their software to prevent a major online breach that could allow hackers to take over their systems.

Singapore gets its first cyber security agency

Singapore gets its first cyber security agency

Singapore is planning to clamp down on cyber-crime with the launch of a central agency for cyber-security, the government announced on Tuesday.

Malaysia Airlines website “compromised” by Lizard Squad

Malaysia Airlines website “compromised” by Lizard Squad

The official website of Malaysia Airlines has been attacked by hackers claiming to be from the Lizard Squad, a group known for previous denial-of-service incidents.

Cyber-security at the forefront of the World Economic Forum

Cyber-security at the forefront of the World Economic Forum

Failing to increase cyber-security measures in companies across the world could cost the global economy up to $3tr, a World Economic Forum report warned, and is urging firms to sign up to a new “framework” to prevent cyber-attacks.

New biometric solution analyses touchscreen habits

New biometric solution analyses touchscreen habits

A start-up company has developed an innovative biometric approach for detecting identity theft, with specific application for mobile devices.

US infiltrated North Korean networks pre-Sony attack, officials say

US infiltrated North Korean networks pre-Sony attack, officials say

The US National Security Agency (NSA) started to interfere with North Korean computer networks more than five years ago, the New York Times reported.

China denies accusations it stole plans for new fighter

China denies accusations it stole plans for new fighter

China rejected allegations it stole F-35 stealth fighter plans as “groundless”, after a new stack of documents leaked by former intelligence contractor Edward Snowden was published by a German magazine.

Cyber-attack drills to be performed by UK and US

Cyber-attack drills to be performed by UK and US

The UK and the US are to set up 'cyber cells' and conduct mock attacks on each other as part of a joint effort to increase defence against online threats.

UK man held over Sony and Xbox hack

UK man held over Sony and Xbox hack

An 18-year-old has been arrested as part of a joint UK and FBI investigation into cyber-attacks on Sony PlayStation and Xbox systems last December.

Obama proposes enhanced cyber-security laws to fight hackers

Obama proposes enhanced cyber-security laws to fight hackers

US President Barack Obama sent a bill to Congress on Tuesday aimed at strengthening cyber-security laws after the recent hacking attacks against Sony Pictures, Home Depot, Target and the federal government.

UK bitcoin storage firm secures KPMG accreditation

UK bitcoin storage firm secures KPMG accreditation

UK firm Elliptic, which stores bitcoins for its financial services clients, has received accreditation from accountants KPMG. Elliptic says that this indicates it operates to the same standards as a custodian bank.

Bitcoin exchange suspends service amid security breach

Bitcoin exchange suspends service amid security breach

One of the largest trading exchanges for the digital bitcoin currency has suspended its service after a security breach that resulted in money losses, it was announced.

2014 engineering and technology highlights and what about 2015?

2014 engineering and technology highlights and what about 2015?

Smartphones becoming 'remote controls' of our lives, the dawn of driverless cars, the Heartbleed software vulnerability and smart thermostats pave the way for engaged consumers – we asked IET experts what were the most significant engineering and technology trends of 2014 and what to expect from the upcoming year.

New warnings for password security

New warnings for password security

Password-based authentication websites including online giants Amazon and LinkedIn could have security loopholes, according to a new study.

North Korea behind Sony hack-attack, FBI announced

North Korea behind Sony hack-attack, FBI announced

UPDATE – The US has officially blamed the North Korean government for the massive cyber-attack against Sony Pictures Entertainment.

Entangled photons to fight cyber fraud

Entangled photons to fight cyber fraud

Dutch researchers have described a new method to fight cyber-crime using quantum physics principles.

Nokia opens security centre in Berlin

Nokia opens security centre in Berlin

Nokia has opened a new mobile security complex in Berlin aimed at creating robust telecommunications security for operators of mobile networks.

Sony’s PlayStation store online disrupted by hack attack

Sony’s PlayStation store online disrupted by hack attack

Sony has confirmed that its online PlayStation store went down following a cyber-attack, with a hacker group called Lizard Squad immediately claiming responsibility.

GCHQ oversight ‘now lawful’ but may not have been previously

GCHQ oversight ‘now lawful’ but may not have been previously

Oversight of GCHQ’s mass surveillance programmes is now lawful, a body that investigates complaints against intelligence agencies has found.

Thousands of Sony passwords saved in ‘Password’ folder

Thousands of Sony passwords saved in ‘Password’ folder

Sony Pictures Entertainment saved thousands of company passwords in a file directory labelled ‘Password’, it has emerged, after hackers leaked another chunk of data following the attack.

Australia launches operation to crack down on bitcoin crime

Australia launches operation to crack down on bitcoin crime

Law enforcers in Australia are investigating the role of virtual currency bitcoin in organised crime, a senior official has said.

Sony still struggling to recover after GOP cyber-attack

Sony still struggling to recover after GOP cyber-attack

Sony Pictures Entertainment is still struggling to recover from an extensive cyber-attack with security experts dismissing the theory that North Korea is the culprit.

FBI sends out alert following devastating Sony hack

FBI sends out alert following devastating Sony hack

The FBI has sent out an alert about a major destructive cyber-attack on a US business, in an apparent reference to last week’s Sony Pictures Entertainment hack.

Cyber-attacks on airlines, energy and defence by Iranian hackers, says report

Cyber-attacks on airlines, energy and defence by Iranian hackers, says report

Coordinated attacks by Iran-based hackers have been directed at major airlines, energy firms and defence companies worldwide according to a report released by a US cyber-security firm.

Sony hires Mandiant to clean up massive cyber-attack

Sony hires Mandiant to clean up massive cyber-attack

Sony Pictures Entertainment has hired FireEye's Mandiant cyber-forensics unit to clean up a massive hack that knocked out its computer nearly a week ago.

Cyber ring steals firms’ secrets to game stock market

Cyber ring steals firms’ secrets to game stock market

One American cyber-security firm has reportedly found an organised espionage ring focusing on stealing corporate secrets to game the stock market.

Proposed UN resolution condemns electronic mass surveillance

Proposed UN resolution condemns electronic mass surveillance

A proposed United Nations resolution has expressed concern at digital spying calling arbitrary mass surveillance and data collection “highly intrusive acts”.

Bitcoin vulnerability reveals IP addresses

Bitcoin vulnerability reveals IP addresses

Hackers can break anonymity of the Bitcoin virtual currency disclosing users’ IP addresses with a €1,500 monthly investment, researchers have found.

Complex cyber-spying malware uncovered by researchers

Complex cyber-spying malware uncovered by researchers

Highly complex cyber-espionage malware that may have been created by state-sponsored hackers has infected private and public entities across the globe.

Snooper's charter ‘dead and buried’ but police to get new Internet powers

Snooper's charter ‘dead and buried’ but police to get new Internet powers

Police will get new powers to force Internet firms to hand over details that could help identify suspects, but a ‘Snooper’s Charter’ is “dead and buried” say Lib Dems.

Hacking major threat to driverless vehicle adoption

Hacking major threat to driverless vehicle adoption

Attacks by hackers are one of the biggest threats to the widespread adoption of driverless or semi-autonomous vehicles, the IET’s cyber-security lead says.

China could shutdown critical US infrastructure, says NSA chief

China could shutdown critical US infrastructure, says NSA chief

China may have the capability to remotely shutdown the computer systems of US power utilities, aviation networks and financial companies, the head of the NSA has told politicians.

Password warning as hackers access thousands of webcams

Password warning as hackers access thousands of webcams

A Russian-based website has been found showing footage from hacked webcams, CCTV cameras and even baby monitors, allowing criminals to spy on people from across the world.

App protects against government snooping

App protects against government snooping

People concerned about governments’ cyber-surveillance practices can use a new web tool to spot if their devices have been infected with eavesdropping malware.

Snapchat launches payment service

Snapchat launches payment service

Picture messaging service Snapchat has launched a payment service enabling users to send money to contacts via the firm’s mobile app.

US collecting mobile data using flying snooping devices

US collecting mobile data using flying snooping devices

The US is gathering data from thousands of mobile phones using fake communications towers on aeroplanes, according to the Wall Street Journal.

iOS bug exposes most iPhones and iPads to hackers

iOS bug exposes most iPhones and iPads to hackers

A bug in Apple’s iOS operating system is exposing most iPhones and iPads to hackers, according to a cyber-security firm.

Website sells stolen credit card details for £8

Website sells stolen credit card details for £8

Cocos Keeling Islands registered website sells credit card details stolen by hackers for as little as £8.

Cyber-security guidelines for safer buildings

Cyber-security guidelines for safer buildings

The Institution of Engineering and Technology (IET) has warned about risks related to modern Internet-connected buildings and launched new guidelines to help owners protect their assets against hackers.

Europe runs largest cyber-security exercise to date

Europe runs largest cyber-security exercise to date

More than 200 cyber-security agencies, energy and telecoms companies, financial institution and Internet service providers have taken part in Cyber Europe 2014, the largest cyber-security exercise to have been run in Europe to date.

Pirate Bay co-founder jailed for hacking in Denmark

Pirate Bay co-founder jailed for hacking in Denmark

Hacker and co-founder of the Swedish file-sharing website The Pirate Bay has been sentenced to three and a half years in prison in Denmark.

China says cyber talks ‘unhindered’ despite US hacking

China says cyber talks ‘unhindered’ despite US hacking

China claims 80 per cent of its government websites have been attacked by hackers, with most assaults launched from the US.

Medical devices under review over cyber-security flaws

Medical devices under review over cyber-security flaws

The US Department of Homeland Security is investigating about two dozen cases of suspected cybersecurity flaws in medical devices, according to a senior official.

Chinese iCloud hacked by government, says web monitor

Chinese iCloud hacked by government, says web monitor

Apple’s iCloud storage and backup service in China has been attacked by hackers believed to be working for the country’s Government.

China says no plans to restart cyber-security talks with US

China says no plans to restart cyber-security talks with US

Resuming cyber-security cooperation between China and the USA would be difficult because of "mistaken US practices", China's top diplomat told US Secretary of State John Kerry.

Phone encryption hampers crime investigation, says FBI

Phone encryption hampers crime investigation, says FBI

Encrypting phone calls makes life difficult for crime investigators, possibly allowing offenders to escape justice, the FBI chief has warned.

South Korea tries to ease cyber-surveillance fears

South Korea tries to ease cyber-surveillance fears

South Korea is trying to ease worries about online privacy after a domestic chat app lost customers to a foreign rival because of fears prosecutors can get access to online conversations.

Poodle web encryption bug discovered by Google

Poodle web encryption bug discovered by Google

Google researchers have discovered a major vulnerability in the SSL encryption technology that could allow hackers to take control of users’ email accounts, online banking and other services.

Dropbox credentials leaked but service blames third party

Dropbox credentials leaked but service blames third party

Hundreds of Dropbox credentials have been leaked by hackers who claim to have seven million logins, but the cloud storage service says its system was not breached.

Windows flaw used by hackers to spy on Nato

Windows flaw used by hackers to spy on Nato

Russian hackers have spied on Nato, the EU, Ukraine and several energy and telecommunications companies through a security flaw in Microsoft Windows.

Court grapples with US surveillance gagging orders

Court grapples with US surveillance gagging orders

A US appeals court is grappling with a lawsuit challenging government gagging orders preventing telecoms firms from revealing demands for customer records.

Police struggling with cyber-crime says top policeman

Police struggling with cyber-crime says top policeman

Police have still not "got to grips" with online fraud despite a huge rise in the crime, the UK's most senior officer has admitted.

China’s armed forces announce cyber-security push

China’s armed forces announce cyber-security push

China's armed forces will ramp up cyber-security and speed domestic software development, the country’s state media said today.

Dynamic phone call encryption to throw hackers off track

Dynamic phone call encryption to throw hackers off track

A dynamic encryption system that changes with every call to confuse possible eavesdroppers has been developed by Danish researchers.

Spanish smart meters easy to hack

Spanish smart meters easy to hack

Millions of network connected electricity smart meters installed all over Spain could be easily attacked by hackers as they lack sufficient cyber protection.

JPMorgan suffers massive data breach despite cyber-security investment

JPMorgan suffers massive data breach despite cyber-security investment

Private information about over 80 million clients of American multinational bank JP Morgan has been stolen by hackers in a massive cyber-attack this summer despite the bank’s increasing cyber-security spending.

Research to scrutinise cyber-risks to infrastructure

Research to scrutinise cyber-risks to infrastructure

A new £2.5m research project will assess the risk posed by hackers and various cyber criminals to the UK’s vital infrastructure.

Hacking ring charged after stealing $100m of software

Hacking ring charged after stealing $100m of software

An alleged international computer hacking ring has been charged with stealing $100m of software including Apache helicopter pilot training programs.

Londoners would give up children to connect to Wi-Fi

Londoners would give up children to connect to Wi-Fi

Six Londoners, subject to an Internet behaviour experiment, have agreed to absurd terms and conditions to connect to a free Wi-Fi hotspot in the capital, a study has revealed.

Don't ignore Shellshock bug, says data protection watchdog

Don't ignore Shellshock bug, says data protection watchdog

Businesses are being warned they could fall foul of data protection laws if they fail to respond to the ‘Shellshock’ bug as hackers begin to exploit the flaw.

New software bug could be bigger than Heartbleed

New software bug could be bigger than Heartbleed

A security bug in a widely used piece of software dubbed ‘Shellshock’ could pose a bigger threat to computer users than the infamous ‘Heartbleed’ bug.

New York financial regulator fears systemic cyber-attack

New York financial regulator fears systemic cyber-attack

A major cyber-attack on the financial system is one thing that keeps New York's financial regulator awake at night, an audience in Manhattan heard.

Chinese hackers steal data from US defence contractors

Chinese hackers steal data from US defence contractors

Computer systems of several US airlines as well as multiple technology companies associated with US military have been breached by Chinese state-sponsored hackers.

New Zealand denies cable surveillance programme

New Zealand denies cable surveillance programme

New Zealand’s Prime Minister John Key denied allegations the country had planned mass surveillance operations as revealed in documents leaked by Edward Snowden.

USA threatened Yahoo with massive fine to acquire user data

USA threatened Yahoo with massive fine to acquire user data

The US government threatened to fine Yahoo $250,000 a day in 2008 if it failed to turn over customer data to intelligence agencies.

Canon printer hacked to play classic game Doom

Canon printer hacked to play classic game Doom

Cyber-security researchers have managed to run the classic 90s computer game Doom on an Internet-enabled Canon printer after hacking its web interface.

Card fraud up despite increased banking security

Card fraud up despite increased banking security

Card fraud hit a record £174.5m in the first half of this year, new figures show, but criminals are relying on social engineering in the face of better security.

Internet of Things needs ‘security first’ architecture

Internet of Things needs ‘security first’ architecture

The Internet of Things needs to be built from the bottom up with a ‘security first’ architecture, according to new research.

Apple pushes two-factor security following photo hack

Apple pushes two-factor security following photo hack

Apple plans additional security features to keep hackers out of user accounts in the face of the recent celebrity photo scandal.

Free cyber-security MOOC course launched

Free cyber-security MOOC course launched

A free online course designed to inspire the next generation of cyber-security professionals supported by the Government has launched.

Hacking behind third of London’s car theft

Hacking behind third of London’s car theft

Car theft has entered the cyber age with more than one in three vehicles currently stolen in London being taken through sophisticated hacking methods, the Home Office has revealed.

Apple says system not breached in celebrity photo hack

Apple says system not breached in celebrity photo hack

Apple says the theft of intimate photos of celebrities including Oscar-winner Jennifer Lawrence was due to a targeted attack on individual iCloud accounts.

International cyber-crime taskforce to be piloted

International cyber-crime taskforce to be piloted

A new international cyber-crime taskforce will be piloted in an attempt to better coordinate the global response to online threats.

Apple service vulnerability responsible for celebrity hack

Apple service vulnerability responsible for celebrity hack

A piece of computer code capable of repeatedly guessing a password has been determined as a likely tool used in the high profile cyber-attack that exposed intimate photographs of tens of celebrities.

Poor coding puts business applications at risk of hacking

Poor coding puts business applications at risk of hacking

Poor code quality is exposing more than two-thirds of retail and financial services applications to cyber-attacks similar to the Heartbleed bug, according to new research.

PlayStation Network back up after denial-of-service attack

PlayStation Network back up after denial-of-service attack

Sony’s PlayStation Network is back online following a cyber-attack that took it down over the weekend.

New game to find next generation of cyber experts

New game to find next generation of cyber experts

A new game that will see players attempt to protect a fictitious aerospace company from hackers is part of a search to find the next generation of cyber-security experts.

FBI issues cyber-attack warning to healthcare providers

FBI issues cyber-attack warning to healthcare providers

US healthcare companies have been subjected to a series of cyber-attacks targeting patient data and intellectual property information, the FBI has said.

First large-scale ‘Heartbleed’ cyber-breach reported

First large-scale ‘Heartbleed’ cyber-breach reported

A cyber-attack that saw hackers steal data on 4.5 million hospital patients is the first known large-scale breach exploiting the ‘Heartbleed’ bug.

Apple starts storing user data on mainland China

Apple starts storing user data on mainland China

Apple has started storing users’ personal data on mainland China for the first time, using servers provided by China Telecom.

Campaign to promote ‘cyber common sense’

Campaign to promote ‘cyber common sense’

A new campaign launched by the National Crime Agency together with the UK government aims to educate users of electronic devices about cyber dangers.

NSA struggles to find employees after spying scandal

NSA struggles to find employees after spying scandal

The US National Security Agency is struggling to attract top technology workers after revelations of widespread eavesdropping practices damaged its reputation.

Anti-spying app heralds end of antivirus era

Anti-spying app heralds end of antivirus era

An Android app that actively scans other apps to determine how risky they are has been launched, promising a new level of user safety.

Massive espionage operation uncovered by cyber firm

Massive espionage operation uncovered by cyber firm

Security researchers at Kaspersky Lab said they have uncovered a massive cyber espionage operation targeting spy agencies and governments in Europe and the Middle East.

US Department of Homeland Security contractor hacked

US Department of Homeland Security contractor hacked

A company contracted to perform background checks for the US Department of Homeland Security said it had been a subject of a most likely state-sponsored cyber-attack.

Russian gang amasses 1.2 billion login credentials

Russian gang amasses 1.2 billion login credentials

Roughly 1.2 billion Internet logins and passwords have been amassed by a Russian criminals, according to a cyber-security firm.

Hacking aircraft satellite systems possible, says researcher

Hacking aircraft satellite systems possible, says researcher

A Spanish cyber-security researcher said he had figured out how to hack satellite communications systems on commercial jets through their Wi-Fi and inflight entertainment systems.

Attack on Canada’s research body linked to ‘Putter Panda’

Attack on Canada’s research body linked to ‘Putter Panda’

The recent hacking attempt on a sensitive Canadian government computer network bears resemblance to attacks mounted by an elite unit of the Chinese army, a cyber-security expert has suggested.

Tor anonymity service users may have been unmasked

Tor anonymity service users may have been unmasked

The group behind Internet-anonymity software Tor has said many of its users may have been identified by government-funded researchers.

USB offers hackers direct route to computers

USB offers hackers direct route to computers

USB technology could be exploited by hackers to load malicious software on computers without triggering security alerts, new research has shown.

BlackBerry to buy encryption tech developer

BlackBerry to buy encryption tech developer

Representatives of privately owned German encryption technology developer Secusmart believe the German government won’t find any obstacles for its prospective sale to smartphone maker BlackBerry.

Bill to ban mass surveillance put to US Senate

Bill to ban mass surveillance put to US Senate

A bill to ban the US government's bulk collection of Americans' telephone records and Internet data has been introduced to Congress.

Israeli missile shield designs stolen by hackers

Israeli missile shield designs stolen by hackers

Companies behind the Israeli Iron Dome missile shield have reportedly been robbed off hundreds of sensitive documents by hackers from China.

Fake ID puts data of Android users at risk

Fake ID puts data of Android users at risk

Sensitive financial and personal information of Android smartphone users could have been accessed by hackers since 2010 due to a previously unknown vulnerability.

Chinese hackers attack Canadian computer system

Chinese hackers attack Canadian computer system

High-level Chinese hackers recently tried to break into a key Canadian computer system, forcing Ottawa to isolate it from the main government network, a senior official said on Tuesday.

Attacks on Android expected to rise

Attacks on Android expected to rise

Ransomware attacks on Android smartphones, preventing users from accessing their gadget unless they pay the attackers, are expected to rise.

Hacking automated homes could help burglars

Hacking automated homes could help burglars

Unsecured automated homes provide an easy access to data about home owners and could be used by burglars seeking access to properties, German researchers have found.

Flaws in privacy software could expose IP addresses

Flaws in privacy software could expose IP addresses

A flaw in an anti-surveillance operating system makes it possible to reveal users’ IP addresses, which are meant to be hidden by the software.

MPs to sue Government over surveillance act

MPs to sue Government over surveillance act

Two MPs will sue the Government over the introduction of the controversial Data Retention and Investigatory Powers Act.

Device protects vehicles from hackers

Device protects vehicles from hackers

Cyber security researchers have developed a prototype device to prevent hackers from launching attacks on travelling cars.

Talk on cracking web anonymity service Tor pulled

Talk on cracking web anonymity service Tor pulled

A talk on how to identify users of the Internet privacy service Tor has been withdrawn from the upcoming Black Hat security conference.

Encrypted calling service extended to 79 countries

Encrypted calling service extended to 79 countries

Customers of a surveillance-dodging mobile calling service can now purchase a fixed rate calling plan that allows them to make encrypted calls across 79 countries, according to the firm.

Cyber-security firm simply seeking publicity, says China

Cyber-security firm simply seeking publicity, says China

A cyber-security firm that claims to have uncovered a state-sponsored hacking group is merely seeking publicity according to China.

US companies warned against ‘Energetic Bear’ virus

US companies warned against ‘Energetic Bear’ virus

The US government has warned critical infrastructure operators to make sure their systems haven’t been infected with malicious software from a hacking group known as Energetic Bear.

Finnish government spied on for years

Finnish government spied on for years

Finland’s government has been subject to a series of ongoing cyber-attacks launched by a foreign government , Finnish officials have revealed.

Home Secretary presses case for snooping powers

Home Secretary presses case for snooping powers

At least 20 cases have been dropped by the National Crime Agency in six months as a result of missing communications data, according to the Home Secretary.

New US ambassador to China raises cyber-espionage

New US ambassador to China raises cyber-espionage

Cyber-theft of trade secrets by China is a threat to US national security, America’s new Ambassador to China Max Baucus said today.

Face recognition password alternative invented

Face recognition password alternative invented

A password alternative that uses a sequence of memorable faces as a key may have cracked the traditional trade-off between memorability and security.

Four in ten organisations obstruct access to personal data

Four in ten organisations obstruct access to personal data

More than four in ten organisations obstruct access to people’s personal data in contravention of European law, a new study has found.

GCHQ to share classified data with industry

GCHQ to share classified data with industry

GCHQ has announced it will start to share classified cyber-threat information with private companies being targeted by increasingly sophisticated hackers.

Deadline to protect against GOZeuS and CryptoLocker looms

Deadline to protect against GOZeuS and CryptoLocker looms

The window for computer users to protect themselves from the GOZeuS and CryptoLocker malware closes at midnight tonight.

The Mask malware employs vintage virus techniques

The Mask malware employs vintage virus techniques

Malware dubbed one of the "most advanced global cyber-espionage operations to date” is using old-school virus techniques, according to new research.

Identify theft checker available as free online service

Identify theft checker available as free online service

Internet users can now check whether or not cyber criminals have stolen any of their personal data and released it online, courtesy of the Identity Leak Checker, a free online service.

Cost of cyber-crime greater than most nations’ GDP

Cost of cyber-crime greater than most nations’ GDP

The cost of cyber-crime is so high that if it were a nation it would be ranked 27th in the world based on revenue, according to a new report.

New cyber-security centre will probe the 'dark web'

New cyber-security centre will probe the 'dark web'

A new cutting-edge cyber-security centre inaugurated in Italy will boost Europe’s cyber defence by scouring the dark internet using one of the most powerful supercomputers in the world.

Vodafone reveals security agencies’ direct link to network

Vodafone reveals security agencies’ direct link to network

Vodafone has disclosed that government agencies in a small number of countries in which it operates have direct access to its network, enabling them to listen in to calls.

New cyber-security certification scheme launched

New cyber-security certification scheme launched

A new cyber-security certification scheme has been launched to help organisations defend themselves against Internet-borne threats.

Email encryption becoming widespread, says Google

Email encryption becoming widespread, says Google

The volume of encrypted email is rising rapidly, according to new data, as providers try to shield their users from government spies and other snoopers.

Electric vehicle charging puts privacy at risk

Electric vehicle charging puts privacy at risk

Regular charging of electric vehicles leaves a data trail which could be exploited by malicious agents, German researchers have said.

Botnet takedown gives public window to clear infections

Botnet takedown gives public window to clear infections

An international operation to take down infrastructure behind two malware families will give computer users a “two-week window” to protect themselves.

Nato drill underlines growing cyber-security concerns

Nato drill underlines growing cyber-security concerns

Nato has run the largest international cyber manoeuvre in the history, underlining the growing importance of cyber warfare in modern-day security.

Hackers are winning the arms race, says survey

Hackers are winning the arms race, says survey

Hackers are more technologically advanced than those trying to stop them, according to a survey of 500 US business executives, law enforcement services and government agencies.

iPhone users hit by ‘ransomware’ type attack

iPhone users hit by ‘ransomware’ type attack

People with iPhones in the UK and Australia have been targeted by hackers who lock their device and demand money to release it.

China bans Windows 8 and screens IT firms for espionage risks

China bans Windows 8 and screens IT firms for espionage risks

Computers of China's government won't be allowed to run Microsoft's Windows 8 operating system, China said, while announcing widespread investigations of IT suppliers to protect national security. 

eBay hackers copied ‘large part’ of 145 million records

eBay hackers copied ‘large part’ of 145 million records

Hackers stole some 145 million user records from eBay servers in what is poised to go down as one of the biggest data breaches in history.

eBay user data compromised by hackers

eBay user data compromised by hackers

eBay is asking users to change their passwords after a cyber attack that compromised a database containing encrypted passwords.

China summons US ambassador over hacking charges

China summons US ambassador over hacking charges

China has summoned the USA’s ambassador after the US accused five Chinese military officers of hacking into American companies to steal trade secrets.

Lockheed Martin under cyber-siege

Lockheed Martin under cyber-siege

US defence giant Lockheed Martin said the number of attacks on its computer systems has quadrupled since 2007.

Samsung’s hacking-proof system safer than BlackBerry's

Samsung’s hacking-proof system safer than BlackBerry's

Samsung’s KNOX system designed for public sector services dealing with sensitive data is secure enough to handle classified information, the UK government has said.

Top eight data breach vulnerabilities revealed

Top eight data breach vulnerabilities revealed

The eight most common IT vulnerabilities that have resulted in data breaches have been revealed by the Information Commissioner’s Office.

Emergency Windows XP update rolled out despite end of support

Emergency Windows XP update rolled out despite end of support

Microsoft has rolled out an urgent update to fix a Windows XP Internet Explorer vulnerability despite having discontinued support for the system this month as hundreds of millions of users haven’t upgraded yet.

Bio-inspired cyber defence system

Bio-inspired cyber defence system

Chemring has developed a network security system mimicking the fight-or-flight fear response of mammals.

Contactless spending tops £100m a month

Contactless spending tops £100m a month

Spending using contactless "tap and go" card payments has topped £100 million in a single month for the first time, industry figures revealed.

Heartbleed bug used against cyber criminals

Heartbleed bug used against cyber criminals

Anti-malware researches have managed to exploit the Heartbleed vulnerability to access protected forums used by hackers to exchange information.

Google admits it scans emails to tailor adverts

Google admits it scans emails to tailor adverts

Google has admitted that incoming and outgoing emails are automatically analysed by software to create targeted ads.

German space agency subject to extensive cyber attack

German space agency subject to extensive cyber attack

Computers of the German Aerospace Centre (DLR) in Cologne have been under an ongoing several month long cyber-attack.

Heartbleed: Bug could affect firewalls, email, mobiles

Heartbleed: Bug could affect firewalls, email, mobiles

Firewalls, email systems and even mobile phones could be at risk from the Heartbleed bug, according to cyber security experts.

Heartbleed: Hackers scanning Web for vulnerability

Heartbleed: Hackers scanning Web for vulnerability

Hacking groups have been detected running automated scans of the Internet in search of Web servers vulnerable to the ‘Heartbleed’ bug.

UK government pays Microsoft to continue Windows XP support

UK government pays Microsoft to continue Windows XP support

The UK government has paid more than £5m to Microsoft to extend Windows XP system support for governmental services.

Journalists most frequent target of state-sponsored hackers

Journalists most frequent target of state-sponsored hackers

Most of the world’s prominent news organisations have been attacked by hackers secretly working for various governments, a study by Google security engineers has revealed.

Call for e-voting in the UK

Call for e-voting in the UK

The UK needs to completely overhaul its voting system introducing new technologies including e-voting to help the public engage with politics, said Electoral Commission Chair Jenny Watson.

Huawei subject to extensive NSA spying operation

Huawei subject to extensive NSA spying operation

The US National Security Agency (NSA) has infiltrated servers of Chinese telecommunications company Huawei, obtaining sensitive information and monitoring the communications of top executives.

Safest wireless protocol more vulnerable than expected

Safest wireless protocol more vulnerable than expected

An international team of researchers has exposed holes in the WPA 2 protocol that has so far been considered the safest system to secure wireless computer networks. 

Ethical hackers test Japan’s cyber-defence

Ethical hackers test Japan’s cyber-defence

Japan has run a large-scale cyber-security exercise, simulating a massive attack on its government departments to spot weaknesses prior to the 2020 Olympics.

Hackers bring down Nato websites

Hackers bring down Nato websites

Nato has been fighting against a string of cyber-attacks over the weekend as hackers disabled several of the organisation’s websites, probably in connection with the Crimea situation.

Nineteen-year-old crowned UK Cyber Security Champion

Nineteen-year-old crowned UK Cyber Security Champion

A 19-year-old student has been crowned as the UK’s Cyber Security Champion after a gruelling two-day national cyber attack simulation.

ATMs still on old software despite end-of-support deadline

ATMs still on old software despite end-of-support deadline

With thousands of ATM’s in the UK still running on the outdated Windows XP software, British banks are now queuing up at Microsoft to negotiate deals for the company to extend support.

NSA denies infecting millions of computers

NSA denies infecting millions of computers

The US National Security Agency has denied allegations it has been infecting millions of computers with malware.

NSA hijacked botnets to use for spying

NSA hijacked botnets to use for spying

The US National Security Agency has been hijacking botnets as a resource for spying, according to a leaked slide by Edward Snowden.

Ukraine under cyber attack

Ukraine under cyber attack

Ukraine’s telecommunications system had been subject to a string of cyber-attacks most likely from Russia, Ukraine’s security agency said.

‘Snake’ cyber espionage toolkit unmasked

‘Snake’ cyber espionage toolkit unmasked

A highly resilient cyber espionage toolkit known as ‘Snake’ has been unmasked by defence contractor BAE Systems.

No point asking China to stop hacking, says Tory MP

No point asking China to stop hacking, says Tory MP

Britain is wasting time asking China to stop cyber attacks, former UN commander and Tory MP Bob Stewart has said.

Encryption solution for manufacturing data resists hacking

Encryption solution for manufacturing data resists hacking

Software that encrypts manufacturing data so as to prevent piracy and data theft will be revealed at a trade show next week.

Recruit geeks to boost cyber-defence, says MP

Recruit geeks to boost cyber-defence, says MP

IT geeks in army reserves could be the solution for the UK to defend the country against growing cyber-threats, a Conservative MP said today.

Labour calls for new cyber-crime powers

Labour calls for new cyber-crime powers

Labour wants new powers that allow security services to crack down on cyber-crimes, but only with extra checks on how sensitive data is used.

Japan calls for international bitcoin regulation

Japan calls for international bitcoin regulation

Japan’s vice finance minister Jiro Aichi has said the bitcoin virtual currency should be regulated on an international level to avoid loopholes and debacles such as this week's closure of a major Bitcoin exchange.

Webcam spying ‘whole new level of violation’

Webcam spying ‘whole new level of violation’

UK spy agency GCHQ has been accused of intercepting and storing webcam images of millions of Yahoo users.

Hackers threaten Brazilian World Cup

Hackers threaten Brazilian World Cup

Hackers have joined protests against the football World Cup to be held in Brazil by threatening to attack the event through jamming websites and data theft.

Contagious airborne Wi-Fi virus demonstrated

Contagious airborne Wi-Fi virus demonstrated

A virus that spreads through Wi-Fi networks as efficiently as a cold spreads between humans has been demonstrated by researchers.

Control system weaknesses ‘easy to discover’ online

Control system weaknesses ‘easy to discover’ online

Data available from mainstream online media could be used to mount a cyber-attack on UK critical national infrastructure.

French rocket engine maker attacked by hackers

French rocket engine maker attacked by hackers

French aerospace company Snecma has been attacked by hackers through an Internet Explorer security gap.

Bitcoin hit by denial-of-service attacks

Bitcoin hit by denial-of-service attacks

Bitcoin has been attacked by unknown hackers sending "mutated" lines of code into the program that runs the virtual currency.

First Spanish language cyber espionage campaign

First Spanish language cyber espionage campaign

The first cyber espionage campaign believed to be started by a Spanish-speaking country has been uncovered by a security software firm.

BAE Systems’ 2014 graduates to expand cyber-security unit

BAE Systems’ 2014 graduates to expand cyber-security unit

BAE Systems plans to recruit more graduates to its cyber and security unit than any other part of its UK business in 2014.

Yahoo customer e-mails hacked in latest security breach

Yahoo customer e-mails hacked in latest security breach

Usernames and passwords of some of Yahoo's e-mail customers have been stolen and used to gather personal information about people they have recently corresponded with.

GCHQ uses Angry Birds to spy on web users

GCHQ uses Angry Birds to spy on web users

American and British intelligence agencies have devised ways to gather data from smartphone applications such as Angry Birds to spy on Internet users, the New York Times has revealed.

Online trust falls to lowest point in three years

Online trust falls to lowest point in three years

Online trust has fallen to its lowest point in three years, with only 55 per cent of British internet users saying they trust companies with their personal data, a survey has revealed.

Critical infrastructure hack data found in public domain

Critical infrastructure hack data found in public domain

Data available from mainstream online media – such as blogs, social networking websites, and specialist online publications – could be used by malevolent agents to mount a cyber-attack on UK critical national infrastructure (CNI), the findings of an investigative assessment to be presented next week will warn.

Military computer in Israel hacked via email

Military computer in Israel hacked via email

Hackers broke into a computer of Israeli defence ministry using an email attachment containing malicious software pretending it had been sent by the country’s Shin Bet security service.

NSA surveillance of 'limited value', says watchdog

NSA surveillance of 'limited value', says watchdog

The NSA's mass phone-call data-gathering programme provided only negligible effects to fight terrorism and should end, the US Privacy and Civil Liberties Oversight Board has concluded.

‘123456’ tops most common password list

‘123456’ tops most common password list

The number sequence '123456' has topped a list of the 25 most commonly used passwords.

Great Firewall glitch redirects users to forbidden site

Great Firewall glitch redirects users to forbidden site

A temporary glitch in China’s Great Firewall has redirected millions of Chinese Internet users to an anti-censorship website meant to be blocked by the system. 

EE rushing to fix router vulnerability

EE rushing to fix router vulnerability

Network operator EE is working on an emergency security upgrade after a researchers discovered a security flaw in its routers.

NSA implants secret technology in spyproof computers

NSA implants secret technology in spyproof computers

The US National Security Agency has implanted secret surveillance software in nearly 100,000 computers around the world to gain access to spy-proof machines.

McAfee pleased Intel dropping name from products

McAfee pleased Intel dropping name from products

Flamboyant millionaire John McAfee has welcomed news that Intel has dropped his name of from its security products.

NSA developing code-cracking quantum computer

NSA developing code-cracking quantum computer

The US National Security Agency is trying to develop a computer that could ultimately break most encryption programs, according to reports.

Syrian Electronic Army hacks Skype's Twitter feed

Syrian Electronic Army hacks Skype's Twitter feed

A hacker collective that supports Syrian President Bashar al-Assad, has claimed credit for hacking Skype's social media accounts.

Cyber-threats of 2014 revealed

Cyber-threats of 2014 revealed

Computer kidnapping, hacking of cars, medical devices or watches, state-sponsored attacks and Obamacare website breaches have been named among the most likely cyber-crimes of 2014.

Surveillance curbs urged by White House-appointed panel

Surveillance curbs urged by White House-appointed panel

A White House-appointed panel has proposed curbs on some key National Security Agency surveillance operations.

Tech companies press Obama on cyber surveillance

Tech companies press Obama on cyber surveillance

Top technology company executives have pressed US President Barack Obama to rein in his government's electronic spying.

Judge rules NSA data collection is likely unlawful

Judge rules NSA data collection is likely unlawful

A judge has ruled that the US National Security Agency's gathering of Americans' phone records is likely unlawful.

Oversight of Huawei boosted over cyber spying fears

Oversight of Huawei boosted over cyber spying fears

Oversight of Chinese telecoms giant Huawei will be increased amid fears its equipment could be used for cyber espionage.

Google tries to block 'clandestine' tracking case

Google tries to block 'clandestine' tracking case

Google is asking the High Court to block a breach of privacy legal action launched against it by a group of British Internet users.

Infrastructure cyber-security institute launched

Infrastructure cyber-security institute launched

A new institute investigating cyber-threats to vital systems that control the UK’s industry and infrastructure has been launched.

Nearly two thirds of web traffic generated by bots

Nearly two thirds of web traffic generated by bots

Almost two thirds of all website traffic is now generated by bots, nearly a third of which are malicious, according to new research.

Police arrest four in £1m cyber-theft by crime ring

Police arrest four in £1m cyber-theft by crime ring

Detectives have arrested four people over a £1m cyber-theft from two banks using computer viruses embedded in emails.

European ministries attacked by Chinese hackers

European ministries attacked by Chinese hackers

Chinese hackers broke into computer systems of five European foreign ministries last September by sending an email containing infected files that loaded malicious codes on the victims’ computers.

Top tech firms urge surveillance restraint

Top tech firms urge surveillance restraint

The world’s top technology companies are urging the USA and other governments to reform their online surveillance practices.

Security agencies spied on online gaming community

Security agencies spied on online gaming community

The US National Security Agency (NSA) and British GSHQ have spied on the international online gaming community, documents leaked by whistle blower Edward Snowden have revealed.

Microsoft disrupts notorious fraud botnet

Microsoft disrupts notorious fraud botnet

Microsoft has disrupted a botnet nearly two million computers strong that costs online advertisers upwards of $2.7m a month.

Android is ‘low-hanging fruit’ for cyber-criminals

Android is ‘low-hanging fruit’ for cyber-criminals

The rapid expansion of the Android operating system is being mirrored by an alarming increase in the amount of malware targeting it, according to an expert.
Arms regulations urged for internet surveillance systems

Arms regulations urged for internet surveillance systems

New arms sale regulations urgently need to be introduced to clamp down on the export of electronic surveillance technology.

Obamacare website too vulnerable, say security experts

Obamacare website too vulnerable, say security experts

Obamacare website puts sensitive data of users at risk, experts have said said, recommending it to be shut down until the problems are addressed.

Yahoo! to encrypt data from next year

Yahoo! to encrypt data from next year

Yahoo! has pledged to encrypt all user information moving between its data centres by the end of the first quarter of next year.

Cyber-attack war game tests London’s banks

Cyber-attack war game tests London’s banks

A fake cyber-attack conducted by a foreign government and a denial-of-service attack disabling users’ networks were among scenarios tested during the Waking Shark II operation.

Credit cards of half million EU users feared hacked

Credit cards of half million EU users feared hacked

Credit card details of some 500,000 European users might be at risk as a marketing firm running award schemes for companies across Europe admitted being a victim of a major hacking attack.

Waking Shark to test London's cyber-preparedness

Waking Shark to test London's cyber-preparedness

Financial companies in the UK’s capital will be put through a war game scenario next week to test how well they can handle an extensive cyber-attack.

Outing of Chinese hacking unit failed to stop attacks

Outing of Chinese hacking unit failed to stop attacks

The outing of a secretive Chinese military hacking unit has failed to halt cyber attacks from the country.

The ‘eBay of vice’ re-opens month after FBI intervention

The ‘eBay of vice’ re-opens month after FBI intervention

A new anonymous Internet marketplace for illegal goods has been opened, featuring the same name and design as the Silk Road but offering better tools to protect users’ anonymity.

Microsoft issues patch to protect Office

Microsoft issues patch to protect Office

Microsoft has released an emergency fix after having learned hackers were exploiting a previously unknown security flaw to attack the popular Office software.

MP's told UK is sleepwalking into a surveillance state

MP's told UK is sleepwalking into a surveillance state

Britain is sleepwalking into becoming a surveillance state as the capacity to collect and analyse data grows MPs were told.

Obamacare system not tested for cyber-security

Obamacare system not tested for cyber-security

The security of the US health insurance website has been put at risk due to a lack of testing before the rushed launch in early October.

Code protecting emails against spying to be made public

Code protecting emails against spying to be made public

A programming code that makes emails shut down when they are at risk of being intercepted will be released to the public to improve communication security.

Contactless cards can be hacked with off-the shelf technology

Contactless cards can be hacked with off-the shelf technology

Hackers can intercept data transmitted between contactless cards and payment terminals using easily available and portable electronic devices, a study of Surrey University researchers has found.

Briton hacks networks of Nasa and US military

Briton hacks networks of Nasa and US military

A 28-year-old hacker from Suffolk, UK, has been arrested by US authorities for penetrating thousands of US military computer systems, aiming to steal confidential data.

Germany wants Internet shielding to counteract spying

Germany wants Internet shielding to counteract spying

Germany’s major telecoms provider is negotiating with other telecoms companies to join forces to protect local Internet from foreign influences.

Biometric cryptographic system to 'eradicate cybercrime'

Biometric cryptographic system to 'eradicate cybercrime'

A new fingerprint scanning biometric authentication system that developers say could eradicate cybercrime has been unveiled.

US outlines cyber security standards for companies

US outlines cyber security standards for companies

The US National Institute of Standards and Technology (NIST) has put forward a draft of voluntary standards to help critical industries prevent cyber-attacks.

NSA collects contacts to map connections of suspects

NSA collects contacts to map connections of suspects

The US National Security Agency collects hundreds of millions of contact lists from personal email and instant messaging accounts.

Public sector mobile security guidance released

Public sector mobile security guidance released

New security guidance for public sector IT professionals on how to safely deploy the latest mobile devices has been released.

Secret web-user tracking more widespread than expected

Secret web-user tracking more widespread than expected

Websites use hidden scripts to extract device fingerprints from users’ browsers without the users’ consent, a Belgian study has found.

Effective response to hacking as important as defence

Effective response to hacking as important as defence

In the wake of the recent hacking attack on Adobe Systems, cyber-security experts have highlighted how companies having an incident response plan in place is as important as preparation against such attacks.

New crime agency targets the ‘deep web’

New crime agency targets the ‘deep web’

The head of the new National Crime Agency has warned criminals using the “deep web” they cannot hide from police.

Adobe source code stolen by hackers

Adobe source code stolen by hackers

Adobe Systems says hackers have stolen source code to some of its most popular software and data about millions of its customers.

Belgians seek response over claims GCHQ hacked telecoms firm

Belgians seek response over claims GCHQ hacked telecoms firm

Britain has been asked by Belgium to respond to claims GCHQ hacked in the IT network of Belgian telecoms provider Belgacom.

UK military looks for IT experts to bolster cyber protection

UK military looks for IT experts to bolster cyber protection

UK Defence Secretary Philip Hammond has appealed to Britain's top IT experts to join the newly established Joint Cyber Reserve Unit to help protect the UK's computer networks from cyber-attacks.

US intelligence chiefs open to surveillance controls

US intelligence chiefs open to surveillance controls

Intelligence chiefs say they are open to measures to increase oversight of the US government’s electronic eavesdropping programs.

Microsoft issues patch to fix Internet Explorer security gap

Microsoft issues patch to fix Internet Explorer security gap

Microsoft has released an emergency software fix for Internet Explorer after hackers exploited a security flaw in the browser to attack an unknown number of users.

IT systems at risk due to lax BYOD attitude, survey says

IT systems at risk due to lax BYOD attitude, survey says

A quarter of UK manufacturing companies are putting their IT systems at risk by allowing employees to use their own personal devices at work but not having a formal bring-your-own-device (BYOD) policy in place, according to research carried out by cloud computing specialist Intrinsic Technology.

NSA can crack or circumvent common encryption

NSA can crack or circumvent common encryption

The USA’s National Security Agency has secretly developed the ability to crack or circumvent commonplace Internet encryption.

Large quantum cryptography networks possible

Large quantum cryptography networks possible

A breakthrough in quantum cryptography could allow large scale communication networks using the technology to be developed.

IT industry ‘losing battle’ against state-backed attacks

IT industry ‘losing battle’ against state-backed attacks

More than half of senior IT security professionals believe the industry is losing the battle against state-sponsored attacks.

New York Times attacked by Syrian hackers

New York Times attacked by Syrian hackers

The Syrian Electronic Army (SAE) has broken into systems of an Australian Internet company managing addresses of some of the world’s most prominent news websites.

Windows 8 prone to cyber-attacks, German experts say

Windows 8 prone to cyber-attacks, German experts say

A German government technology agency has warned that new security technology in computers running Microsoft's Windows 8 operating system may actually make PCs more vulnerable to cyber threats.

New app helps prevent phishing

New app helps prevent phishing

Researchers from the Royal Holloway University have developed a prototype app that can help protect users against phishing attacks.

NSA broke privacy rules thousands of times a year

NSA broke privacy rules thousands of times a year

The USA’s National Security Agency broke privacy rules or overstepped its authority thousands of times each year since 2008.

Syrian hackers use novel method to target news sites

Syrian hackers use novel method to target news sites

Hackers from the Syrian Electronic Army have simultaneously targeted several news sites by breaching a single supplier.

Germany wants to boost European IT to fight US espionage

Germany wants to boost European IT to fight US espionage

Germany’s government wants to foster Europe’s technology companies to make them stronger competitors to their US counterparts.

Selected it-security features

Cyber-security: organisations vulnerable to new swathe of attacks

Cyber-security: organisations vulnerable to new swathe of attacks

2014 saw Apple, Target, Ebay and Sony become victims of cyber theft, and while experts warn 2015 is set for further disasters, organisations are betting on not being targets rather than addressing the core problems.

Analysis: Public Posturing on Cyber-security Fools No One

Analysis: Public Posturing on Cyber-security Fools No One

Just what kind of political game was China playing in October? On 30 October, senior Chinese officials said that talks with the US were "unhindered" even though they had their differences. The statement was made less than two weeks after others in the Chinese government said that it had stopped talking to the US about cyber-security, following what it called "mistaken US practices".

How many security researchers does it take to hack a light bulb?

How many security researchers does it take to hack a light bulb?

How many cyber-security researchers does it take to hack a light bulb? About six, according to one firm, which has demonstrated that the manufacturers of the growing number of connected devices in our homes appear to have a security blind spot.

Analysis: do router security problems foreshadow IoT hacks?

Analysis: do router security problems foreshadow IoT hacks?

Nothing is safe on the Internet, including your home router. That may already have been hacked – but if the world becomes as connected as companies are hoping, that could be the least of your worries.

Analysis: What lessons can be learned from the Heartbleed fiasco?

Analysis: What lessons can be learned from the Heartbleed fiasco?

The continuing furore over the Heartbleed bug holds important lessons for the IT industry, both about the way it responds to major incidents and also the way software is produced.

The Web at 25 – is it showing its age?

The Web at 25 – is it showing its age?

From humble beginnings the World Wide Web has become the backbone of modern civilisation, but the inability of its creators to foresee its meteoric rise has resulted in shaky foundations.

Embedded world faces up to growing security challenge

Embedded world faces up to growing security challenge

Security has become an even more major concern for the makers of processors and software for embedded systems in the rush to connect them to wireless network – and even the wider Internet. It is driving a rethink in the way devices are designed to prevent network-based attacks and attempts to reverse-engineer the firmware inside.

Healthcare identity assurance - warding off fraud

Healthcare identity assurance - warding off fraud

The healthcare industry is under attack, with imposters, fraudsters and cyber-criminals pretending to be people they are not to acquire personal patient data. But the ID theft clampdown has begun.

The State vs The People

The State vs The People

As the world becomes ever more digitised, the uneasy relationship between personal privacy and national security grows increasingly complex.

Smart grid home security

Smart grid home security

Just who are you inviting into your home with that latest 'smart' technology purchase?

Identity - how safe are you online?

Identity - how safe are you online?

With more and more people living out large parts of their lives online, cybercriminals are finding endless new ways of stealing identities.

How to disarm an infrastructure hacker

How to disarm an infrastructure hacker

The media has been full of reports of cyber-attacks on critical infrastructure, but the fear is that there is far worse to come.

Hacking the Internet - bringing down infrastructure

Hacking the Internet - bringing down infrastructure

Why should hackers try to disable computers when they might be able to set their sights higher? Routers can be just as vulnerable as servers, so why not bring down the entire Internet?

News analysis: Calculating the true cost of cyber-crime

News analysis: Calculating the true cost of cyber-crime

While governments state that cyber security is now one of their top national challenges, the overall cost-impact cyber security is incurring – both in terms of necessary investment and damaging outcomes following an attack – is far from clear.

Firewall vendors revisit core technologies to win market

Firewall vendors revisit core technologies to win market

Firewalls should still be an integral part of any enterprise's cyber security strategy, and vendors of the hardware variety are redoubling their R&D to win more market share.

Cyber security - small firms now in the firing line

Cyber security - small firms now in the firing line

Small businesses need to upgrade their awareness of - and abilities in - cyber security if they are to avoid becoming the 'soft underbelly' of the UK's fights against hackers and cyber threats.

Point-of-sale cyber security: hacking the check-out

Point-of-sale cyber security: hacking the check-out

As point-of-sale systems embrace mainstream software, they will have to deal with the security threats that come with it. After all, what cybercriminal wouldn't go after Windows-based devices handling credit and debit cards?

Ethical hacking: bad in a good way

Ethical hacking: bad in a good way

More and more organisations are being targeted in cyber-attacks, and they must get to know their enemy if they are to protect vital networks. Meet the professional, ethical hacker.

Safety and security convergence - a new era?

Safety and security convergence - a new era?

We are moving toward a world where every connected system is becoming safety critical - so ICT professionals should step up to the principles of ultra-rigorous system design and build.

PIN apps: Hacking on the hoof

PIN apps: Hacking on the hoof

'Grey hat' apps are a new phenomenon in software that enable street hackers to delve into your smartphone and access your data, and more besides.

The dangers of hoax security breaches

The dangers of hoax security breaches

A fake hack attack can be as damaging as a real one and they're becoming increasingly common.

Google Android: how secure is its future?

Google Android: how secure is its future?

How has Google's Android smartphone operating system managed to become so successful?

EU Data legislation amendments

EU Data legislation amendments

Proposed amendments to the EU data privacy laws propose to swap-out carrots for sticks in a redoubled effort to get European organisations to do a better job to protect everyones' data.

Terrorism's invisible propaganda network

Terrorism's invisible propaganda network

Global militant organisations are tapping into the vulnerabilities in mobile technologies for propaganda and recruitment, as well as to filch data for financial gain.

VoIP: voicing security concerns

VoIP: voicing security concerns

Channelling voice calls over IP networks has brought many advantages to enterprise communications, but it also creates some security risks.

IT Security Legislation Guide

IT Security Legislation Guide

IT is one of the most rigorously regulated parts of an organisation, and legislation affecting information security is spearheading the legal changes.

ID access management's cloud challenge

ID access management's cloud challenge

With users accessing systems from ever more obscure points of entry, how do you keep control of access privileges? We look at the software that may have the answer.

Infrastructure cyber attack threat grows

Infrastructure cyber attack threat grows

Despite high-profile attacks, there is still a lack of IT security in key public infrastructure. We ask if it will take a major meltdown to prompt governments to take action.

IT security: isolating the problem

IT security: isolating the problem

PC operating systems are full of security holes, which is why some are now turning to software first developed for 'hidden' computers to better protect them

Data breach – Could Sony have done more?

Data breach – Could Sony have done more?

Data breaches like the one that affected Sony aren’t the end of the world if companies are honest with customers who have been affected.

Cyber-criminals target quake-hit network

Cyber-criminals target quake-hit network

Japan's Internet infrastructure withstood quake and tsunami, but was also left working for cyber-criminals to exploit the anguish of survivors desperate for information

Public eyes gets smart

Public eyes gets smart

Latest-generation CCTV cameras are bringing intelligent observation to some of the world’s most scrutinised cities. E&T zooms in on the innovations.

Cyber terrorism: the reality

Cyber terrorism: the reality

The future threat that the Stuxnet worm poses is a blueprint for attacks on real-world infrastructure, but what is being done to protect industrial control systems and who cares, asks E&T.

Cyber-terrorism concerns growing

Cyber-terrorism concerns growing

How worried should we be about the likelihood of cyber-terrorist attacks launched through the Internet?

Analysis: US Bill puts 'cyber-war' on legislative agenda

Analysis: US Bill puts 'cyber-war' on legislative agenda

Critics say a controversial bill going through Congress would let the US President 'turn off the Internet' if vital services were threatened.

Preparing for the worst

Preparing for the worst

Cyberwar threats are all too real, E&T investigates.

Social engineering: an intruder's tale

Posing as an IT consultant, Colin Greenless performed a penetration test on a FTSE-listed financial services firm. One or two tricks of social engineering gave him free access to some very useful - and very valuable - information.

Analysis: a unified framework for IT security

The IT security sector must take a more unified approach to establishing industry-wide standards for all aspects of secure systems build and maintenance, argues E&T.

You've been hacked

You've been hacked

Cybercrime is a real and growing problem. As the internet grows, so do the numbers of people ready to able and exploit its vulnerabilities.

Killer spam: the business threat

Ever-escalating spam levels are close to tearing the commercial guts out of any business and organisation that relies on email as a primary method of business communication.

IT security's infamous five

Despite all the warnings, all the headlines, and all the headaches, there are some security basics that we just keep leaving undone: Graham Cluley names them.

Security skills: aptly qualified or merely mollified?

IT security specialists want recognition and acclaim from their managers – but gaining the proper qualifications to endorse their status is not clear-cut.

Hardware that blocks hardcore

Bloxx Tru-View could be on the list of organisations worried about what their staff are downloading from the web.

Hacking the human

Any IT security can be circumvented by hackers who target the human factor - but risk can be minimised