Special focus: IT security

Laptop with various cables plugged in

There are myriad security challenges facing IT professionals today: personal computers that get hacked, viruses hijack machines, and keystroke loggers steal passwords which end up on public web sites. Yet the amount of security-critical transactions conducted on such systems is steadily increasing.

 

There are also mobile devices such as smartphones and tablet PCs, increasingly being used for critical transactions and projected to replace PCs as the web access device of choice. All these computing devices are in use in modern businesses and their effective management poses a growing challenge to the IT professional.

 

Selected it-security news

New secure communication system plugs Tor’s vulnerabilities

New secure communication system plugs Tor’s vulnerabilities

A new system for anonymous exchange of digital information promises to address the shortcomings of popular anonymity software Tor while speeding up secure transfer of data files.

Brexit no threat to UK, say cyber-security professionals

Brexit no threat to UK, say cyber-security professionals

The UK’s ability to protect itself against cyber-attacks won’t change if the country opts to leave the European Union, a survey of cyber-security professionals suggests.

Over 30 million Twitter passwords stolen through user targeting malware

Over 30 million Twitter passwords stolen through user targeting malware

Almost 33 million Twitter passwords, usernames and email addresses have been leaked online, probably collected through a malware attack targeting users rather than the microblogging website itself.

Singapore’s government employees offline due to cyber-attacks

Singapore’s government employees offline due to cyber-attacks

Singapore is taking what seems to be a step backwards as it decides to shut down Internet access for government employees despite pledging to become a high-tech nation.

Cloud sharing puts companies' sensitive data at risk, survey says

Cloud sharing puts companies' sensitive data at risk, survey says

A new survey has revealed that employees regularly share sensitive company data via cloud-based applications such as Dropbox, Gmail or Facebook, offering hackers easy access to information which could be negatively exploited.

Facebook CEO Zuckerberg’s social media accounts hacked

Facebook CEO Zuckerberg’s social media accounts hacked

Several social media accounts belonging to Facebook CEO Mark Zuckerberg were hacked over the weekend, after Saudi Arabian attackers reportedly found his credentials in the recent LinkedIn data dump.

Browsers protect better than antivirus, research suggests

Browsers protect better than antivirus, research suggests

Keeping Internet browsers up to date may provide better security than installing some commonly used malware protection software, which might actually increase vulnerability according to new research.

Computers in German nuclear plant infected with virus

Computers in German nuclear plant infected with virus

Computer systems at a German nuclear power plant have been found to be infected with viruses, although no harm has been done as the systems were isolated from the internet.

Industrial networks in ‘mess’, says Kaspersky

Industrial networks in ‘mess’, says Kaspersky

Cyber protection of industrial networks is in a poor state despite the growing sophistication and number of attacks, said leading cyber security expert Eugene Kaspersky.

Improper disposal of electronic devices puts data at risk

Improper disposal of electronic devices puts data at risk

Confidential data from customers and employees is being put at risk by companies who fail to discard electronic devices properly, a study has found.

Selfies may replace passwords in securing Amazon’s payment systems

Selfies may replace passwords in securing Amazon’s payment systems

Online retail giant Amazon is proposing replacing passwords with selfies to improve security of web payment applications.

Embedded systems group aims to tighten up security

Embedded systems group aims to tighten up security

Two years after the point-of-sale (POS) terminals at US retailers Home Depot and Target were hacked, the same malware-based type of attack has hit a number of hotel chains including those owned by Hilton and Trump, focusing attention on the weak security inside embedded systems that are connected to networks.

Hospital pays ransom to hackers to regain control of computer system

Hospital pays ransom to hackers to regain control of computer system

A Los Angeles hospital has paid a ransom of $17,000 in bitcoins to an unknown hacking group to regain control of its computer systems after a cyber-attack.

Apple refuses to build ‘backdoor into the iPhone’ despite court order

Apple refuses to build ‘backdoor into the iPhone’ despite court order

Apple has refused to build special software to enable the FBI to bypass the security of one of its devices, despite orders from a US District Court.

Privacy victory, as Google removes 'right to be forgotten' content across EU

Privacy victory, as Google removes 'right to be forgotten' content across EU

Google has confirmed that it will hide content removed using the "right to be forgotten" ruling from more versions of its search engine, thus removing challenged content in more countries.

Wi-Fi tracking and video analysis could be exploited by retailers

Wi-Fi tracking and video analysis could be exploited by retailers

Technology that allows retailers to track individuals through their Wi-Fi-connected smartphones and recognise them using video analysis could be exploited without customers' knowledge, the Information Commissioner’s Office has warned.

Facebook Android app now allows private browsing

Facebook Android app now allows private browsing

Facebook has added anonymity service Tor to their Android app, allowing users to browse the network without leaving any traces. 

Microsoft ends support for most Internet Explorer versions

Microsoft ends support for most Internet Explorer versions

Microsoft is ending support for all versions of its Internet Explorer (IE) web browser with the exception of the latest version 11. The end of support comes with security risks for users that fail to upgrade. 

Turkey under 'most intense' cyber-attack in its history

Turkey under 'most intense' cyber-attack in its history

Turkish Internet has been under a series of sustained cyber-attacks since Monday that may be the most intense in the country’s history, according to Turkey’s internet management body. 

Stricter data privacy law to be approved by EU

Stricter data privacy law to be approved by EU

The EU is expected to approve a new personal data protection law replacing a set of 28 different laws of individual member states. 

Europe-wide cyber-security law agreed

Europe-wide cyber-security law agreed

European legislators have agreed on a new cyber-security law that will require critical infrastructure operators, as well as internet service providers, to report breaches. 

Hackers steal data on 650,000 Wetherspoons customers

Hackers steal data on 650,000 Wetherspoons customers

UK pub company JD Wetherspoon has admitted that the personal details of 650,000 people may have been stolen in a data hack on its website.

Hackers breach Australia’s defence network through weather computers

Hackers breach Australia’s defence network through weather computers

Cyber-attackers reportedly from China may have accessed networks of Australia’s defence ministry by hacking a powerful weather computer. 

Blackberry pulls out of Pakistan over spying allegations

Blackberry pulls out of Pakistan over spying allegations

Blackberry has announced it is ceasing operations in Pakistan because the government wanted to spy on the communications of its users.

Almost half of UK consumers have experienced cybercrime

Almost half of UK consumers have experienced cybercrime

44 per cent of UK consumers have been hit with cybercrime at some point, with half of those (22 per cent) experiencing it in the last year.

Self-updating router to increase Internet security

Self-updating router to increase Internet security

A router automatically installing security updates, described by its creators as more secure than anything in the market, has met its crowd-funding goal in less than 24 hours.

Explicit filenames providing hacker signposts to sensitive data

Explicit filenames providing hacker signposts to sensitive data

Enterprise staff are unwittingly helping hackers find documents containing valuable data by using giveaway keywords in file names.

Chinese cyber-attacks on US continue, despite agreement

Chinese cyber-attacks on US continue, despite agreement

Hackers associated with the Chinese government have continued their attacks on US companies, despite the recent agreement between Washington and Beijing not to spy on each other for commercial reasons, according to a prominent security firm.

Airline anti-terrorism system suffers glitch

Airline anti-terrorism system suffers glitch

A computer system of the US Department of Homeland Security that checks airline passengers against terrorism watch lists suffered a glitch on Wednesday, leading to delays at major airports.

Uber accuses rival of stealing data on its drivers

Uber accuses rival of stealing data on its drivers

App-based taxi firm Uber has accused rival company Lyft of hacking into its systems to steal the names and license numbers of 50,000 of its drivers.

GCHQ 'smurfs' can remotely control people’s phones

GCHQ 'smurfs' can remotely control people’s phones

National Security Agency whistle-blower Edward Snowden has claimed the UK spying agency can eavesdrop on people by controlling the microphones of their phones and even remotely switch the handsets off and on. 

Nuclear facilities vulnerable to cyber-attack, warns report

Nuclear facilities vulnerable to cyber-attack, warns report

Nuclear facilities around the world are at risk of cyber-attack according to a new report from the think tank Chatham House.

Automotive cyber-security concerns 'could shape future car design'

Automotive cyber-security concerns 'could shape future car design'

Makers of connected cars must radically rethink vehicle design and build if they are to counteract emerging automotive cyber-security threats, an industry expert has warned.

Consumer rights for digital purchases brought up to date

Consumer rights for digital purchases brought up to date

Consumers are being given new legal rights from today that will entitle them to a repair or replacement when digital products are faulty.

Apps removed from NHS library after leaking personal data

Apps removed from NHS library after leaking personal data

The NHS has removed health apps from its accredited library after researchers showed they were leaking people's medical details over the Internet.

5.6 million fingerprints stolen in US government data hack

5.6 million fingerprints stolen in US government data hack

The US government has admitted that a security data breach earlier in the year at the Office of Personnel Management (OPM) and the Department of Defense resulted in hackers obtaining a total of 5.6 million employee fingerprints.

EU court says countries can block US data spies

EU court says countries can block US data spies

EU countries should be able to block US spies from accessing their citizens' data, the ECJ has said, in what is being billed as a landmark ruling.

Mobile app protects against credit card fraud

Mobile app protects against credit card fraud

A new cheap way to protect against credit card fraud has been developed, which turns plain-text card information into electrical current to prevent data theft. 

France presses 'right to be forgotten' case against Google

France presses 'right to be forgotten' case against Google

France's data protection watchdog has rejected Google's request to drop a case relating to the search engine's refusal to delist French citizens' data on its non-EU sites.

Automakers asked to explain cyber-security protections

Automakers asked to explain cyber-security protections

The world's biggest carmakers have been asked by two US senators to explain the steps they have taken to protect cars from being hacked.

China asks US tech firms to provide 'back door key'

China asks US tech firms to provide 'back door key'

China is asking US technology firms to pledge to uphold policies that could see them turn user data and intellectual property over to the government, according to a report.

Spyware snooping software found on Cisco web routers

Spyware snooping software found on Cisco web routers

Cyber-spies have managed to plant snooping software in Cisco routers, located on three continents, which direct traffic around the Internet.

China and US hold 'frank' discussions on cyber-security

China and US hold 'frank' discussions on cyber-security

Cyber-security was one of the key topics at four days of meetings between senior Chinese and US officials that concluded on Saturday.

Top US spy urges beefed up cyber-security

Top US spy urges beefed up cyber-security

The USA needs to beef up its cyber-security to raise the costs for Chinese hackers launching attacks, America's top intelligence official says.

Microsoft seeks to block US warrant for Irish data server

Microsoft seeks to block US warrant for Irish data server

Microsoft has asked a US court to block the country's government from forcing it to hand over customer emails stored on an Irish server.

EU and USA agree protection for shared data

EU and USA agree protection for shared data

The European Union and the USA have reached an agreement on how to protect data that is shared for law enforcement purposes.

Trader involved in $100m hacking scheme pleads not guilty

Trader involved in $100m hacking scheme pleads not guilty

One of the traders allegedly involved in a more than $100m (£65m) insider trading scheme that hacked sensitive corporate news releases has pleaded not guilty.

NHS health records available online next year

NHS health records available online next year

Patients will be able to access their GP records from their smartphone or tablet within the next 12 months, says health minister Jeremy Hunt.

US government data breach victims still in the dark

US government data breach victims still in the dark

None of the 21.5 million federal employees and contractors whose security clearance data was hacked more than three months ago have been informed, officials admit.

US considers sanctions for China and Russia over cyber-theft

US considers sanctions for China and Russia over cyber-theft

The USA may issue sanctions against firms and individuals from China and Russia believed to be behind cyber-attacks against US commercial targets, officials said.

Ashley Madison offers reward for info on hackers

Ashley Madison offers reward for info on hackers

Adultery website Ashley Madison is offering a 500,000 Canadian dollar reward for information on hackers who published its customers' details.

Second data dump in AshleyMadison hack

Second data dump in AshleyMadison hack

Founder of infidelity website AshleyMadison had his private emails leaked as part of the second data dump in the high-profile hacking case.

Thermal imaging iPhone accessory helps crack keypad codes

Thermal imaging iPhone accessory helps crack keypad codes

Criminals can use a readily available iPhone accessory that costs less than £200 to steal codes for push button security devices.

Phishing emails averaging at 20 a month, research reveals

Phishing emails averaging at 20 a month, research reveals

People receive up to 20 phishing emails a month, research shows, with many involving sophisticated mimics of government departments, banks and major companies.

IoT security risks ignored by enterprise systems

IoT security risks ignored by enterprise systems

More than two-thirds of IT professionals feel they are forced to adopt smart devices in spite of the security risks, a survey has found.

Security flaw in car immobiliser supressed for two years

Security flaw in car immobiliser supressed for two years

News of a major security flaw in a widely used car immobiliser system was suppressed for two years by Volkswagen (VW).

AshleyMadison personal user data exposed online

AshleyMadison personal user data exposed online

The personal data of more than a million users of the adultery website AshleyMadison.com have been leaked online by morality conscious hackers.

Cyber-security rules revived to control IT in Chinese banks

Cyber-security rules revived to control IT in Chinese banks

Cyber-security rules designed to prevent western IT technology being purchased by Chinese banks have been revived after being side-lined earlier this year.

Bank of England to query insurers cyber-protection

Bank of England to query insurers cyber-protection

The Bank of England is sending questionnaires to the UK's largest insurers to make sure they are properly protected against cyber-attacks.

Hacker admits compromising thousands of Facebook accounts

Hacker admits compromising thousands of Facebook accounts

One of the hackers behind online cyber-criminal forum Darkode has pleaded guilty to breaking into at least 77,000 computers, prosecutors said.

AT&T accused of helping NSA with Internet spying

AT&T accused of helping NSA with Internet spying

Telecoms provider AT&T has been helping the US National Security Agency conduct surveillance on Internet traffic, according to the New York Times.

Details of hacker insider trading scheme revealed

Details of hacker insider trading scheme revealed

Prosecutors have revealed the details of a scheme that saw stock traders and hackers team up to make as much as $100m in illegal profits over five years.

Insider trading hacker ring to be indicted today

Insider trading hacker ring to be indicted today

US prosecutors will announce charges later today against an insider trading ring that hacked disseminators of news releases, a source said.

Carphone Warehouse suffers major data breach

Carphone Warehouse suffers major data breach

Hackers may have stolen the personal details of as many as 2.4 million Carphone Warehouse customers.

Zigbee's wireless security flaws threatens IoT devices

Zigbee's wireless security flaws threatens IoT devices

The ZigBee wireless communications specification used by many Internet of Things (IoT) devices contains critical security flaws, IT firm Cognosec has claimed.

Russia prime suspect in cyber-attack on US military

Russia prime suspect in cyber-attack on US military

Russia has been named the prime suspect behind a cyber-attack on an unclassified email network of US military’s Joint Staff that forced the Pentagon last month to restrict access to portions of the network.

Google and Samsung agree regular Android security fixes

Google and Samsung agree regular Android security fixes

Google and Samsung will release monthly security fixes for Android phones, following the unveiling of the Stagefright bug in the mobile operating system.

China to place security teams in major Internet firms

China to place security teams in major Internet firms

China will set up "network security offices" at major Internet companies and websites as it tightens its grip over the domestic Internet.

Standard computer hacked to transmit data via sound

Standard computer hacked to transmit data via sound

Standard computer hardware has been hacked by a team of security researchers to send information out of an office through sound waves.

Cyber-security bill likely to be passed by US Senate

Cyber-security bill likely to be passed by US Senate

US senators will consider a bill this week that will make it easier for firms to share Americans' personal information with each other or the government.

Russians hackers used Twitter, photos to reach US computers

Russians hackers used Twitter, photos to reach US computers

Russian-backed hackers used Twitter posts combined with data hidden in photos to control US government and defence industry computers.

Stagefright Android bug 'worse than Heartbleed'

Stagefright Android bug 'worse than Heartbleed'

Hackers could access millions of Android-powered phones via a multimedia message due to a newly discovered vulnerability in the heart of Google’s operating system.

French council approves controversial surveillance bill

French council approves controversial surveillance bill

France’s Constitutional Council has ruled that a highly controversial bill that was introduced to allow government surveillance of terrorism suspects does not violate the country’s constitution.

MPs win snooping powers legal challenge

MPs win snooping powers legal challenge

Two Members of Parliament have won a High Court battle over the UK government’s emergency extension of surveillance powers.

Ex-employees probed in attack on Italian surveillance firm

Ex-employees probed in attack on Italian surveillance firm

Milan prosecutors are investigating six former employees of cybersecurity firm Hacking Team in connection with a massive hack of its systems that saw huge chucks of its code stolen.

Darkode hacking forum seized by authorities

Darkode hacking forum seized by authorities

The Darkode online forum used by cybercriminals around the world has been shut down by US authorities after an investigation carried out in 20 countries.

Victims of US government hack still not informed

Victims of US government hack still not informed

None of the 21.5 million Americans whose personal details were compromised in a hack of government databanks have been informed yet, say officials.

Security services have ‘a lot to fear over encryption’, report says

Security services have ‘a lot to fear over encryption’, report says

UK security services fear they could be locked out from the communications of potentially dangerous suspects due to sophisticated encryption tools, a report has warned.

Italian surveillance firm claims hack was by state actors

Italian surveillance firm claims hack was by state actors

A cyber-surveillance company believes a government may have been behind a massive hack of its systems that saw huge chunks of its code stolen.

21.5 million people hit in US data breach

21.5 million people hit in US data breach

Hackers stole social security identification numbers and other highly sensitive information from at least 21.5 million people, officials said on Thursday.

Swapping faces in photos could protect privacy online

Swapping faces in photos could protect privacy online

A Hertfordshire University researcher has proposed a privacy algorithm for social media that would automatically replace faces in photos with artificial ones, thus protecting people’s privacy online.

Middle-manager inaction the weak link in enterprise cyber-security

Middle-manager inaction the weak link in enterprise cyber-security

Lethargic, narrow-minded middle-managers are among the biggest remaining obstacles to consolidating enterprise cyber-security, an industry expert has warned.

Virtual Private Networks leak users’ data, study finds

Virtual Private Networks leak users’ data, study finds

Virtual Private Networks used to encrypt users’ information against surveillance and hacking could actually leak private data due to a newly discovered vulnerability.

Campaign calls for greater online protection for children

Campaign calls for greater online protection for children

Children are a click away from accessing pornography, violent videos and being exposed to cyber-bullying, an online child safety group has warned.

RBS promises £150m IT investment after major failure

RBS promises £150m IT investment after major failure

The Royal Bank of Scotland will invest £150m a year to improve resilience of its computer system after a major IT failure affected thousands of customers this week.

Canadian government web sites hacked in cyber attack

Canadian government web sites hacked in cyber attack

Several Canadian government websites and servers have been brought back online after they were taken down for several hours in a cyber-attack on Wednesday.

Thousands of apps leave data exposed to hackers

Thousands of apps leave data exposed to hackers

Thousands of smartphone applications including the most popular ones store users’ data online in a way that makes them easily accessible to hackers, say German cyber security researchers.

Chinese hackers suspected of stealing US government data

Chinese hackers suspected of stealing US government data

Chinese hackers are suspected of breaking in to US government computers and stealing data from at least four million federal workers, officials have said.

IT security 'should be pitched like other business enablers'

IT security 'should be pitched like other business enablers'

Enterprise information security chiefs could boost their chances of getting the funding they need by emulating sales and marketing budgeting practices, a security industry expert believes.

'Brainprint' signals proposed as unique human ID

'Brainprint' signals proposed as unique human ID

The unique way the brain of every person responds to certain words could be used for identification purposes instead of passwords, researchers have proposed.

'Cloud amnesty' would let IT provide secure alternatives

'Cloud amnesty' would let IT provide secure alternatives

Employers should offer an 'amnesty' to staff who secretly use cloud-based services for enterprise data, so that they can make known use of unsuitable and risky Web-based providers without fear of censure, according to an IT security expert.

Criminals ‘more likely to recruit online’ warns UK police director

Criminals ‘more likely to recruit online’ warns UK police director

Illegal downloading of music and film could lead to cyber-crime, a senior police officer has warned on Wednesday.

End to US data collection powers as Senate deal falls

End to US data collection powers as Senate deal falls

The legal authority for US intelligence agencies’ to bulk collect Americans’ phone records has expired, after the Senate failed to pass legislation to extend the deal.

China to bring out five-year cybersecurity plan

China to bring out five-year cybersecurity plan

China is believed to be preparing a five-year cybersecurity plan to protect state secrets and data, according to a report from China Daily on Thursday.

United Airlines to reward code debuggers with air miles

United Airlines to reward code debuggers with air miles

US flight operator United Airlines has launched a reward programme for security experts who reveal vulnerabilities in the software used on its web sites.

US House votes to end NSA bulk collection of phone data

US House votes to end NSA bulk collection of phone data

The US House of Representatives has voted to end the NSA’s bulk collection of American’s telephone data on Wednesday.

NSA ‘asked’ Germany’s BND to snoop on Siemens

NSA ‘asked’ Germany’s BND to snoop on Siemens

The US National Security Agency (NSA) wanted to spy on Siemens with the help of German intelligence, a German newspaper reported, in what could be a shaming episode for Chancellor Angela Merkel.

French parliament approves surveillance rules in counterterror move

French parliament approves surveillance rules in counterterror move

French lawmakers have approved a controversial law to let intelligence services use spying devices more easily, with the aim of preventing Islamist attacks.

WikiLeaks republishes hacked Sony Pictures documents

WikiLeaks republishes hacked Sony Pictures documents

Whistleblower site WikiLeaks has released a searchable database online of tens of thousands of emails and documents stolen by hackers in a cyber-attack on Sony Pictures Entertainment last year.

Planes could be hacked through in-flight entertainment system

Planes could be hacked through in-flight entertainment system

Airliners could be hacked mid-flight through passengers using the plane’s wireless entertainment system to access its flight controls, a US agency says.

Successful hacks and cyber attacks commonly result of human error

Successful hacks and cyber attacks commonly result of human error

A pair of reports released this week reveal that the vast majority of hacking attacks that threaten businesses are down to human error.

‘Sustained’ Chinese cyber-espionage campaign targeted Southeast Asia

‘Sustained’ Chinese cyber-espionage campaign targeted Southeast Asia

A decade-long cyber-espionage campaign against governments and businesses in Southeast Asia is likely of Chinese origin, says internet security firm FireEye.

Destructive hacking more common than previously thought

Destructive hacking more common than previously thought

Hacking attacks aimed at destroying data or manipulating industrial equipment are far more common than previously thought, according to a new survey.

Intelligence agencies at loggerheads with cyber criminals

Intelligence agencies at loggerheads with cyber criminals

UK intelligence agencies are engaged in a “technology arms race” with cyber criminals and other “malicious actors”, according to MI6 chief Alex Younger.

Encryption works in favour of terror suspects, says Europol chief

Encryption works in favour of terror suspects, says Europol chief

Tough encryption software used on mobile phones and in apps is the biggest challenge for security agencies tackling terrorism, according to Europol chief Rob Wainwright.

UK to get more cyber security students

UK to get more cyber security students

Students will get funding support through university if they choose a cyber-security related course as part of a new scheme, Cabinet Office minister Francis Maude said on Tuesday in the Commons.

Facebook’s new payment feature to attract hackers

Facebook’s new payment feature to attract hackers

The new feature of Facebook’s Messenger app allowing people to transfer money by a single tap of a button is likely to make the social network climb up the cyber-criminals' priority list, researchers have agreed.

UK intelligence agencies cleared of breaking surveillance laws

UK intelligence agencies cleared of breaking surveillance laws

UK’s security and intelligence agencies do not seek to bypass existing surveillance laws, but a tighter legislative framework is needed to protect privacy, a cross-party committee said in a landmark report.

Amateur cyber defenders could be recruited after mock cyber-attack

Amateur cyber defenders could be recruited after mock cyber-attack

A group of amateur cyber defenders have to investigate and fend off a simulated cyber terrorist plot and could lead to them gaining permanent jobs in the industry.

CIA’s decade-long quest to break iPhone security

CIA’s decade-long quest to break iPhone security

CIA was developing software to spy on iPhone and iPad users through apps distributed by Apple’s App store.

Hackers can spy on Londoners as public WiFi poorly protected

Hackers can spy on Londoners as public WiFi poorly protected

Millions of users connecting every day to public WiFi networks in the UK’s capital are putting their sensitive data at risks as more than a half of those wireless hotspots use weak protection hackable by ‘every IT college student,’ world’s leading cyber security firm said.

‘Immature’ Internet of Things hackable with primitive methods

‘Immature’ Internet of Things hackable with primitive methods

The emerging Internet of Things lags massively behind conventional computers in terms of cyber security with manufacturers failing to implement basic security practices, a researcher has demonstrated.

Europol prevents hackers from controlling millions of PCs

Europol prevents hackers from controlling millions of PCs

A group of hackers that infiltrated 3.2 million compromised computers all around the world to steal banking information has been stopped by European police and technology companies, officials said.

Tokenisation to allow Europe to join mobile payment revolution

Tokenisation to allow Europe to join mobile payment revolution

Visa Europe is to launch what it calls a tokenisation service providing better protection for mobile payment solutions.

Lenovo in row over adware that compromises user security

Lenovo in row over adware that compromises user security

The world’s biggest computer manufacturer has been forced to remove virus-like software from its laptops after customer backlash over potential security vulnerabilities.

US and UK blamed for hacking SIM card firm to access phones

US and UK blamed for hacking SIM card firm to access phones

US and UK intelligence agencies have allegedly hacked into a major maker of SIM cards, allowing them to eavesdrop on billions of mobile users around the world, a US news website claims.

Sophisticated snooping software exposed by Russian researchers

Sophisticated snooping software exposed by Russian researchers

Spying software that could eavesdrop on the majority of the world’s computers undetected has been identified by cyber researchers buried deep within hard drives made by top manufacturers.

Banks ‘lose $1bn’ in cyber-robberies, report says

Banks ‘lose $1bn’ in cyber-robberies, report says

A hacking network has stolen up to $1bn from more than 100 banks and financial institutions around the world in what would be an “unprecedented cyber-robbery”, claims a cyber-security firm.

Obama to discuss cybersecurity with tech giants

Obama to discuss cybersecurity with tech giants

President Barack Obama is holding a summit on cybersecurity and consumer protection on Friday with top industry figures, including Apple’s Tom Cook, to encourage companies to share more information about cybersecurity threats with the government.

Millions of records stolen from US health insurer Anthem after cyber-attack

Millions of records stolen from US health insurer Anthem after cyber-attack

Hackers have stolen troves of data including names, birthdays and social security numbers from up to 80 million people in a cyber-security breach against Anthem, the US’ second-largest health insurer, it was announced.

Tackling emissions and cyber threat priorities of Obama’s budget

Tackling emissions and cyber threat priorities of Obama’s budget

The $3.99 trillion 2016 budget proposal of the US President Barack Obama, announced on Monday, includes $14bn for cyber-security as well as a new $4bn fund to facilitate the US transition to cleaner energy.

Linux makers update software to stop ‘Ghost’ cyber threat

Linux makers update software to stop ‘Ghost’ cyber threat

A number of manufacturers of the Linux operating system, including Red Hat, updated their software to prevent a major online breach that could allow hackers to take over their systems.

Singapore gets its first cyber security agency

Singapore gets its first cyber security agency

Singapore is planning to clamp down on cyber-crime with the launch of a central agency for cyber-security, the government announced on Tuesday.

Malaysia Airlines website “compromised” by Lizard Squad

Malaysia Airlines website “compromised” by Lizard Squad

The official website of Malaysia Airlines has been attacked by hackers claiming to be from the Lizard Squad, a group known for previous denial-of-service incidents.

Cyber-security at the forefront of the World Economic Forum

Cyber-security at the forefront of the World Economic Forum

Failing to increase cyber-security measures in companies across the world could cost the global economy up to $3tr, a World Economic Forum report warned, and is urging firms to sign up to a new “framework” to prevent cyber-attacks.

New biometric solution analyses touchscreen habits

New biometric solution analyses touchscreen habits

A start-up company has developed an innovative biometric approach for detecting identity theft, with specific application for mobile devices.

US infiltrated North Korean networks pre-Sony attack, officials say

US infiltrated North Korean networks pre-Sony attack, officials say

The US National Security Agency (NSA) started to interfere with North Korean computer networks more than five years ago, the New York Times reported.

China denies accusations it stole plans for new fighter

China denies accusations it stole plans for new fighter

China rejected allegations it stole F-35 stealth fighter plans as “groundless”, after a new stack of documents leaked by former intelligence contractor Edward Snowden was published by a German magazine.

Cyber-attack drills to be performed by UK and US

Cyber-attack drills to be performed by UK and US

The UK and the US are to set up 'cyber cells' and conduct mock attacks on each other as part of a joint effort to increase defence against online threats.

UK man held over Sony and Xbox hack

UK man held over Sony and Xbox hack

An 18-year-old has been arrested as part of a joint UK and FBI investigation into cyber-attacks on Sony PlayStation and Xbox systems last December.

Obama proposes enhanced cyber-security laws to fight hackers

Obama proposes enhanced cyber-security laws to fight hackers

US President Barack Obama sent a bill to Congress on Tuesday aimed at strengthening cyber-security laws after the recent hacking attacks against Sony Pictures, Home Depot, Target and the federal government.

UK bitcoin storage firm secures KPMG accreditation

UK bitcoin storage firm secures KPMG accreditation

UK firm Elliptic, which stores bitcoins for its financial services clients, has received accreditation from accountants KPMG. Elliptic says that this indicates it operates to the same standards as a custodian bank.

Bitcoin exchange suspends service amid security breach

Bitcoin exchange suspends service amid security breach

One of the largest trading exchanges for the digital bitcoin currency has suspended its service after a security breach that resulted in money losses, it was announced.

2014 engineering and technology highlights and what about 2015?

2014 engineering and technology highlights and what about 2015?

Smartphones becoming 'remote controls' of our lives, the dawn of driverless cars, the Heartbleed software vulnerability and smart thermostats pave the way for engaged consumers – we asked IET experts what were the most significant engineering and technology trends of 2014 and what to expect from the upcoming year.

New warnings for password security

New warnings for password security

Password-based authentication websites including online giants Amazon and LinkedIn could have security loopholes, according to a new study.

North Korea behind Sony hack-attack, FBI announced

North Korea behind Sony hack-attack, FBI announced

UPDATE – The US has officially blamed the North Korean government for the massive cyber-attack against Sony Pictures Entertainment.

Entangled photons to fight cyber fraud

Entangled photons to fight cyber fraud

Dutch researchers have described a new method to fight cyber-crime using quantum physics principles.

Nokia opens security centre in Berlin

Nokia opens security centre in Berlin

Nokia has opened a new mobile security complex in Berlin aimed at creating robust telecommunications security for operators of mobile networks.

Sony’s PlayStation store online disrupted by hack attack

Sony’s PlayStation store online disrupted by hack attack

Sony has confirmed that its online PlayStation store went down following a cyber-attack, with a hacker group called Lizard Squad immediately claiming responsibility.

GCHQ oversight ‘now lawful’ but may not have been previously

GCHQ oversight ‘now lawful’ but may not have been previously

Oversight of GCHQ’s mass surveillance programmes is now lawful, a body that investigates complaints against intelligence agencies has found.

Thousands of Sony passwords saved in ‘Password’ folder

Thousands of Sony passwords saved in ‘Password’ folder

Sony Pictures Entertainment saved thousands of company passwords in a file directory labelled ‘Password’, it has emerged, after hackers leaked another chunk of data following the attack.

Australia launches operation to crack down on bitcoin crime

Australia launches operation to crack down on bitcoin crime

Law enforcers in Australia are investigating the role of virtual currency bitcoin in organised crime, a senior official has said.

Sony still struggling to recover after GOP cyber-attack

Sony still struggling to recover after GOP cyber-attack

Sony Pictures Entertainment is still struggling to recover from an extensive cyber-attack with security experts dismissing the theory that North Korea is the culprit.

FBI sends out alert following devastating Sony hack

FBI sends out alert following devastating Sony hack

The FBI has sent out an alert about a major destructive cyber-attack on a US business, in an apparent reference to last week’s Sony Pictures Entertainment hack.

Cyber-attacks on airlines, energy and defence by Iranian hackers, says report

Cyber-attacks on airlines, energy and defence by Iranian hackers, says report

Coordinated attacks by Iran-based hackers have been directed at major airlines, energy firms and defence companies worldwide according to a report released by a US cyber-security firm.

Sony hires Mandiant to clean up massive cyber-attack

Sony hires Mandiant to clean up massive cyber-attack

Sony Pictures Entertainment has hired FireEye's Mandiant cyber-forensics unit to clean up a massive hack that knocked out its computer nearly a week ago.

Cyber ring steals firms’ secrets to game stock market

Cyber ring steals firms’ secrets to game stock market

One American cyber-security firm has reportedly found an organised espionage ring focusing on stealing corporate secrets to game the stock market.

Proposed UN resolution condemns electronic mass surveillance

Proposed UN resolution condemns electronic mass surveillance

A proposed United Nations resolution has expressed concern at digital spying calling arbitrary mass surveillance and data collection “highly intrusive acts”.

Bitcoin vulnerability reveals IP addresses

Bitcoin vulnerability reveals IP addresses

Hackers can break anonymity of the Bitcoin virtual currency disclosing users’ IP addresses with a €1,500 monthly investment, researchers have found.

Complex cyber-spying malware uncovered by researchers

Complex cyber-spying malware uncovered by researchers

Highly complex cyber-espionage malware that may have been created by state-sponsored hackers has infected private and public entities across the globe.

Snooper's charter ‘dead and buried’ but police to get new Internet powers

Snooper's charter ‘dead and buried’ but police to get new Internet powers

Police will get new powers to force Internet firms to hand over details that could help identify suspects, but a ‘Snooper’s Charter’ is “dead and buried” say Lib Dems.

Hacking major threat to driverless vehicle adoption

Hacking major threat to driverless vehicle adoption

Attacks by hackers are one of the biggest threats to the widespread adoption of driverless or semi-autonomous vehicles, the IET’s cyber-security lead says.

China could shutdown critical US infrastructure, says NSA chief

China could shutdown critical US infrastructure, says NSA chief

China may have the capability to remotely shutdown the computer systems of US power utilities, aviation networks and financial companies, the head of the NSA has told politicians.

Password warning as hackers access thousands of webcams

Password warning as hackers access thousands of webcams

A Russian-based website has been found showing footage from hacked webcams, CCTV cameras and even baby monitors, allowing criminals to spy on people from across the world.

App protects against government snooping

App protects against government snooping

People concerned about governments’ cyber-surveillance practices can use a new web tool to spot if their devices have been infected with eavesdropping malware.

Snapchat launches payment service

Snapchat launches payment service

Picture messaging service Snapchat has launched a payment service enabling users to send money to contacts via the firm’s mobile app.

US collecting mobile data using flying snooping devices

US collecting mobile data using flying snooping devices

The US is gathering data from thousands of mobile phones using fake communications towers on aeroplanes, according to the Wall Street Journal.

iOS bug exposes most iPhones and iPads to hackers

iOS bug exposes most iPhones and iPads to hackers

A bug in Apple’s iOS operating system is exposing most iPhones and iPads to hackers, according to a cyber-security firm.

Website sells stolen credit card details for £8

Website sells stolen credit card details for £8

Cocos Keeling Islands registered website sells credit card details stolen by hackers for as little as £8.

Cyber-security guidelines for safer buildings

Cyber-security guidelines for safer buildings

The Institution of Engineering and Technology (IET) has warned about risks related to modern Internet-connected buildings and launched new guidelines to help owners protect their assets against hackers.

Europe runs largest cyber-security exercise to date

Europe runs largest cyber-security exercise to date

More than 200 cyber-security agencies, energy and telecoms companies, financial institution and Internet service providers have taken part in Cyber Europe 2014, the largest cyber-security exercise to have been run in Europe to date.

Pirate Bay co-founder jailed for hacking in Denmark

Pirate Bay co-founder jailed for hacking in Denmark

Hacker and co-founder of the Swedish file-sharing website The Pirate Bay has been sentenced to three and a half years in prison in Denmark.

China says cyber talks ‘unhindered’ despite US hacking

China says cyber talks ‘unhindered’ despite US hacking

China claims 80 per cent of its government websites have been attacked by hackers, with most assaults launched from the US.

Medical devices under review over cyber-security flaws

Medical devices under review over cyber-security flaws

The US Department of Homeland Security is investigating about two dozen cases of suspected cybersecurity flaws in medical devices, according to a senior official.

Chinese iCloud hacked by government, says web monitor

Chinese iCloud hacked by government, says web monitor

Apple’s iCloud storage and backup service in China has been attacked by hackers believed to be working for the country’s Government.

China says no plans to restart cyber-security talks with US

China says no plans to restart cyber-security talks with US

Resuming cyber-security cooperation between China and the USA would be difficult because of "mistaken US practices", China's top diplomat told US Secretary of State John Kerry.

Phone encryption hampers crime investigation, says FBI

Phone encryption hampers crime investigation, says FBI

Encrypting phone calls makes life difficult for crime investigators, possibly allowing offenders to escape justice, the FBI chief has warned.

South Korea tries to ease cyber-surveillance fears

South Korea tries to ease cyber-surveillance fears

South Korea is trying to ease worries about online privacy after a domestic chat app lost customers to a foreign rival because of fears prosecutors can get access to online conversations.

Poodle web encryption bug discovered by Google

Poodle web encryption bug discovered by Google

Google researchers have discovered a major vulnerability in the SSL encryption technology that could allow hackers to take control of users’ email accounts, online banking and other services.

Dropbox credentials leaked but service blames third party

Dropbox credentials leaked but service blames third party

Hundreds of Dropbox credentials have been leaked by hackers who claim to have seven million logins, but the cloud storage service says its system was not breached.

Windows flaw used by hackers to spy on Nato

Windows flaw used by hackers to spy on Nato

Russian hackers have spied on Nato, the EU, Ukraine and several energy and telecommunications companies through a security flaw in Microsoft Windows.

Court grapples with US surveillance gagging orders

Court grapples with US surveillance gagging orders

A US appeals court is grappling with a lawsuit challenging government gagging orders preventing telecoms firms from revealing demands for customer records.

Police struggling with cyber-crime says top policeman

Police struggling with cyber-crime says top policeman

Police have still not "got to grips" with online fraud despite a huge rise in the crime, the UK's most senior officer has admitted.

China’s armed forces announce cyber-security push

China’s armed forces announce cyber-security push

China's armed forces will ramp up cyber-security and speed domestic software development, the country’s state media said today.

Dynamic phone call encryption to throw hackers off track

Dynamic phone call encryption to throw hackers off track

A dynamic encryption system that changes with every call to confuse possible eavesdroppers has been developed by Danish researchers.

Spanish smart meters easy to hack

Spanish smart meters easy to hack

Millions of network connected electricity smart meters installed all over Spain could be easily attacked by hackers as they lack sufficient cyber protection.

JPMorgan suffers massive data breach despite cyber-security investment

JPMorgan suffers massive data breach despite cyber-security investment

Private information about over 80 million clients of American multinational bank JP Morgan has been stolen by hackers in a massive cyber-attack this summer despite the bank’s increasing cyber-security spending.

Research to scrutinise cyber-risks to infrastructure

Research to scrutinise cyber-risks to infrastructure

A new £2.5m research project will assess the risk posed by hackers and various cyber criminals to the UK’s vital infrastructure.

Hacking ring charged after stealing $100m of software

Hacking ring charged after stealing $100m of software

An alleged international computer hacking ring has been charged with stealing $100m of software including Apache helicopter pilot training programs.

Londoners would give up children to connect to Wi-Fi

Londoners would give up children to connect to Wi-Fi

Six Londoners, subject to an Internet behaviour experiment, have agreed to absurd terms and conditions to connect to a free Wi-Fi hotspot in the capital, a study has revealed.

Don't ignore Shellshock bug, says data protection watchdog

Don't ignore Shellshock bug, says data protection watchdog

Businesses are being warned they could fall foul of data protection laws if they fail to respond to the ‘Shellshock’ bug as hackers begin to exploit the flaw.

New software bug could be bigger than Heartbleed

New software bug could be bigger than Heartbleed

A security bug in a widely used piece of software dubbed ‘Shellshock’ could pose a bigger threat to computer users than the infamous ‘Heartbleed’ bug.

New York financial regulator fears systemic cyber-attack

New York financial regulator fears systemic cyber-attack

A major cyber-attack on the financial system is one thing that keeps New York's financial regulator awake at night, an audience in Manhattan heard.

Chinese hackers steal data from US defence contractors

Chinese hackers steal data from US defence contractors

Computer systems of several US airlines as well as multiple technology companies associated with US military have been breached by Chinese state-sponsored hackers.

New Zealand denies cable surveillance programme

New Zealand denies cable surveillance programme

New Zealand’s Prime Minister John Key denied allegations the country had planned mass surveillance operations as revealed in documents leaked by Edward Snowden.

USA threatened Yahoo with massive fine to acquire user data

USA threatened Yahoo with massive fine to acquire user data

The US government threatened to fine Yahoo $250,000 a day in 2008 if it failed to turn over customer data to intelligence agencies.

Canon printer hacked to play classic game Doom

Canon printer hacked to play classic game Doom

Cyber-security researchers have managed to run the classic 90s computer game Doom on an Internet-enabled Canon printer after hacking its web interface.

Card fraud up despite increased banking security

Card fraud up despite increased banking security

Card fraud hit a record £174.5m in the first half of this year, new figures show, but criminals are relying on social engineering in the face of better security.

Internet of Things needs ‘security first’ architecture

Internet of Things needs ‘security first’ architecture

The Internet of Things needs to be built from the bottom up with a ‘security first’ architecture, according to new research.

Apple pushes two-factor security following photo hack

Apple pushes two-factor security following photo hack

Apple plans additional security features to keep hackers out of user accounts in the face of the recent celebrity photo scandal.

Free cyber-security MOOC course launched

Free cyber-security MOOC course launched

A free online course designed to inspire the next generation of cyber-security professionals supported by the Government has launched.

Hacking behind third of London’s car theft

Hacking behind third of London’s car theft

Car theft has entered the cyber age with more than one in three vehicles currently stolen in London being taken through sophisticated hacking methods, the Home Office has revealed.

Apple says system not breached in celebrity photo hack

Apple says system not breached in celebrity photo hack

Apple says the theft of intimate photos of celebrities including Oscar-winner Jennifer Lawrence was due to a targeted attack on individual iCloud accounts.

International cyber-crime taskforce to be piloted

International cyber-crime taskforce to be piloted

A new international cyber-crime taskforce will be piloted in an attempt to better coordinate the global response to online threats.

Apple service vulnerability responsible for celebrity hack

Apple service vulnerability responsible for celebrity hack

A piece of computer code capable of repeatedly guessing a password has been determined as a likely tool used in the high profile cyber-attack that exposed intimate photographs of tens of celebrities.

Poor coding puts business applications at risk of hacking

Poor coding puts business applications at risk of hacking

Poor code quality is exposing more than two-thirds of retail and financial services applications to cyber-attacks similar to the Heartbleed bug, according to new research.

PlayStation Network back up after denial-of-service attack

PlayStation Network back up after denial-of-service attack

Sony’s PlayStation Network is back online following a cyber-attack that took it down over the weekend.

New game to find next generation of cyber experts

New game to find next generation of cyber experts

A new game that will see players attempt to protect a fictitious aerospace company from hackers is part of a search to find the next generation of cyber-security experts.

FBI issues cyber-attack warning to healthcare providers

FBI issues cyber-attack warning to healthcare providers

US healthcare companies have been subjected to a series of cyber-attacks targeting patient data and intellectual property information, the FBI has said.

First large-scale ‘Heartbleed’ cyber-breach reported

First large-scale ‘Heartbleed’ cyber-breach reported

A cyber-attack that saw hackers steal data on 4.5 million hospital patients is the first known large-scale breach exploiting the ‘Heartbleed’ bug.

Apple starts storing user data on mainland China

Apple starts storing user data on mainland China

Apple has started storing users’ personal data on mainland China for the first time, using servers provided by China Telecom.

Campaign to promote ‘cyber common sense’

Campaign to promote ‘cyber common sense’

A new campaign launched by the National Crime Agency together with the UK government aims to educate users of electronic devices about cyber dangers.

NSA struggles to find employees after spying scandal

NSA struggles to find employees after spying scandal

The US National Security Agency is struggling to attract top technology workers after revelations of widespread eavesdropping practices damaged its reputation.

Anti-spying app heralds end of antivirus era

Anti-spying app heralds end of antivirus era

An Android app that actively scans other apps to determine how risky they are has been launched, promising a new level of user safety.

Massive espionage operation uncovered by cyber firm

Massive espionage operation uncovered by cyber firm

Security researchers at Kaspersky Lab said they have uncovered a massive cyber espionage operation targeting spy agencies and governments in Europe and the Middle East.

US Department of Homeland Security contractor hacked

US Department of Homeland Security contractor hacked

A company contracted to perform background checks for the US Department of Homeland Security said it had been a subject of a most likely state-sponsored cyber-attack.

Russian gang amasses 1.2 billion login credentials

Russian gang amasses 1.2 billion login credentials

Roughly 1.2 billion Internet logins and passwords have been amassed by a Russian criminals, according to a cyber-security firm.

Hacking aircraft satellite systems possible, says researcher

Hacking aircraft satellite systems possible, says researcher

A Spanish cyber-security researcher said he had figured out how to hack satellite communications systems on commercial jets through their Wi-Fi and inflight entertainment systems.

Attack on Canada’s research body linked to ‘Putter Panda’

Attack on Canada’s research body linked to ‘Putter Panda’

The recent hacking attempt on a sensitive Canadian government computer network bears resemblance to attacks mounted by an elite unit of the Chinese army, a cyber-security expert has suggested.

Tor anonymity service users may have been unmasked

Tor anonymity service users may have been unmasked

The group behind Internet-anonymity software Tor has said many of its users may have been identified by government-funded researchers.

USB offers hackers direct route to computers

USB offers hackers direct route to computers

USB technology could be exploited by hackers to load malicious software on computers without triggering security alerts, new research has shown.

BlackBerry to buy encryption tech developer

BlackBerry to buy encryption tech developer

Representatives of privately owned German encryption technology developer Secusmart believe the German government won’t find any obstacles for its prospective sale to smartphone maker BlackBerry.

Bill to ban mass surveillance put to US Senate

Bill to ban mass surveillance put to US Senate

A bill to ban the US government's bulk collection of Americans' telephone records and Internet data has been introduced to Congress.

Israeli missile shield designs stolen by hackers

Israeli missile shield designs stolen by hackers

Companies behind the Israeli Iron Dome missile shield have reportedly been robbed off hundreds of sensitive documents by hackers from China.

Fake ID puts data of Android users at risk

Fake ID puts data of Android users at risk

Sensitive financial and personal information of Android smartphone users could have been accessed by hackers since 2010 due to a previously unknown vulnerability.

Chinese hackers attack Canadian computer system

Chinese hackers attack Canadian computer system

High-level Chinese hackers recently tried to break into a key Canadian computer system, forcing Ottawa to isolate it from the main government network, a senior official said on Tuesday.

Attacks on Android expected to rise

Attacks on Android expected to rise

Ransomware attacks on Android smartphones, preventing users from accessing their gadget unless they pay the attackers, are expected to rise.

Hacking automated homes could help burglars

Hacking automated homes could help burglars

Unsecured automated homes provide an easy access to data about home owners and could be used by burglars seeking access to properties, German researchers have found.

Flaws in privacy software could expose IP addresses

Flaws in privacy software could expose IP addresses

A flaw in an anti-surveillance operating system makes it possible to reveal users’ IP addresses, which are meant to be hidden by the software.

MPs to sue Government over surveillance act

MPs to sue Government over surveillance act

Two MPs will sue the Government over the introduction of the controversial Data Retention and Investigatory Powers Act.

Device protects vehicles from hackers

Device protects vehicles from hackers

Cyber security researchers have developed a prototype device to prevent hackers from launching attacks on travelling cars.

Talk on cracking web anonymity service Tor pulled

Talk on cracking web anonymity service Tor pulled

A talk on how to identify users of the Internet privacy service Tor has been withdrawn from the upcoming Black Hat security conference.

Encrypted calling service extended to 79 countries

Encrypted calling service extended to 79 countries

Customers of a surveillance-dodging mobile calling service can now purchase a fixed rate calling plan that allows them to make encrypted calls across 79 countries, according to the firm.

Cyber-security firm simply seeking publicity, says China

Cyber-security firm simply seeking publicity, says China

A cyber-security firm that claims to have uncovered a state-sponsored hacking group is merely seeking publicity according to China.

US companies warned against ‘Energetic Bear’ virus

US companies warned against ‘Energetic Bear’ virus

The US government has warned critical infrastructure operators to make sure their systems haven’t been infected with malicious software from a hacking group known as Energetic Bear.

Finnish government spied on for years

Finnish government spied on for years

Finland’s government has been subject to a series of ongoing cyber-attacks launched by a foreign government , Finnish officials have revealed.

Home Secretary presses case for snooping powers

Home Secretary presses case for snooping powers

At least 20 cases have been dropped by the National Crime Agency in six months as a result of missing communications data, according to the Home Secretary.

New US ambassador to China raises cyber-espionage

New US ambassador to China raises cyber-espionage

Cyber-theft of trade secrets by China is a threat to US national security, America’s new Ambassador to China Max Baucus said today.

Face recognition password alternative invented

Face recognition password alternative invented

A password alternative that uses a sequence of memorable faces as a key may have cracked the traditional trade-off between memorability and security.

Four in ten organisations obstruct access to personal data

Four in ten organisations obstruct access to personal data

More than four in ten organisations obstruct access to people’s personal data in contravention of European law, a new study has found.

GCHQ to share classified data with industry

GCHQ to share classified data with industry

GCHQ has announced it will start to share classified cyber-threat information with private companies being targeted by increasingly sophisticated hackers.

Deadline to protect against GOZeuS and CryptoLocker looms

Deadline to protect against GOZeuS and CryptoLocker looms

The window for computer users to protect themselves from the GOZeuS and CryptoLocker malware closes at midnight tonight.

The Mask malware employs vintage virus techniques

The Mask malware employs vintage virus techniques

Malware dubbed one of the "most advanced global cyber-espionage operations to date” is using old-school virus techniques, according to new research.

Identify theft checker available as free online service

Identify theft checker available as free online service

Internet users can now check whether or not cyber criminals have stolen any of their personal data and released it online, courtesy of the Identity Leak Checker, a free online service.

Cost of cyber-crime greater than most nations’ GDP

Cost of cyber-crime greater than most nations’ GDP

The cost of cyber-crime is so high that if it were a nation it would be ranked 27th in the world based on revenue, according to a new report.

New cyber-security centre will probe the 'dark web'

New cyber-security centre will probe the 'dark web'

A new cutting-edge cyber-security centre inaugurated in Italy will boost Europe’s cyber defence by scouring the dark internet using one of the most powerful supercomputers in the world.

Vodafone reveals security agencies’ direct link to network

Vodafone reveals security agencies’ direct link to network

Vodafone has disclosed that government agencies in a small number of countries in which it operates have direct access to its network, enabling them to listen in to calls.

New cyber-security certification scheme launched

New cyber-security certification scheme launched

A new cyber-security certification scheme has been launched to help organisations defend themselves against Internet-borne threats.

Email encryption becoming widespread, says Google

Email encryption becoming widespread, says Google

The volume of encrypted email is rising rapidly, according to new data, as providers try to shield their users from government spies and other snoopers.

Electric vehicle charging puts privacy at risk

Electric vehicle charging puts privacy at risk

Regular charging of electric vehicles leaves a data trail which could be exploited by malicious agents, German researchers have said.

Botnet takedown gives public window to clear infections

Botnet takedown gives public window to clear infections

An international operation to take down infrastructure behind two malware families will give computer users a “two-week window” to protect themselves.

Nato drill underlines growing cyber-security concerns

Nato drill underlines growing cyber-security concerns

Nato has run the largest international cyber manoeuvre in the history, underlining the growing importance of cyber warfare in modern-day security.

Hackers are winning the arms race, says survey

Hackers are winning the arms race, says survey

Hackers are more technologically advanced than those trying to stop them, according to a survey of 500 US business executives, law enforcement services and government agencies.

iPhone users hit by ‘ransomware’ type attack

iPhone users hit by ‘ransomware’ type attack

People with iPhones in the UK and Australia have been targeted by hackers who lock their device and demand money to release it.

China bans Windows 8 and screens IT firms for espionage risks

China bans Windows 8 and screens IT firms for espionage risks

Computers of China's government won't be allowed to run Microsoft's Windows 8 operating system, China said, while announcing widespread investigations of IT suppliers to protect national security. 

eBay hackers copied ‘large part’ of 145 million records

eBay hackers copied ‘large part’ of 145 million records

Hackers stole some 145 million user records from eBay servers in what is poised to go down as one of the biggest data breaches in history.

eBay user data compromised by hackers

eBay user data compromised by hackers

eBay is asking users to change their passwords after a cyber attack that compromised a database containing encrypted passwords.

China summons US ambassador over hacking charges

China summons US ambassador over hacking charges

China has summoned the USA’s ambassador after the US accused five Chinese military officers of hacking into American companies to steal trade secrets.

Lockheed Martin under cyber-siege

Lockheed Martin under cyber-siege

US defence giant Lockheed Martin said the number of attacks on its computer systems has quadrupled since 2007.

Samsung’s hacking-proof system safer than BlackBerry's

Samsung’s hacking-proof system safer than BlackBerry's

Samsung’s KNOX system designed for public sector services dealing with sensitive data is secure enough to handle classified information, the UK government has said.

Top eight data breach vulnerabilities revealed

Top eight data breach vulnerabilities revealed

The eight most common IT vulnerabilities that have resulted in data breaches have been revealed by the Information Commissioner’s Office.

Emergency Windows XP update rolled out despite end of support

Emergency Windows XP update rolled out despite end of support

Microsoft has rolled out an urgent update to fix a Windows XP Internet Explorer vulnerability despite having discontinued support for the system this month as hundreds of millions of users haven’t upgraded yet.

Bio-inspired cyber defence system

Bio-inspired cyber defence system

Chemring has developed a network security system mimicking the fight-or-flight fear response of mammals.

Contactless spending tops £100m a month

Contactless spending tops £100m a month

Spending using contactless "tap and go" card payments has topped £100 million in a single month for the first time, industry figures revealed.

Heartbleed bug used against cyber criminals

Heartbleed bug used against cyber criminals

Anti-malware researches have managed to exploit the Heartbleed vulnerability to access protected forums used by hackers to exchange information.

Google admits it scans emails to tailor adverts

Google admits it scans emails to tailor adverts

Google has admitted that incoming and outgoing emails are automatically analysed by software to create targeted ads.

German space agency subject to extensive cyber attack

German space agency subject to extensive cyber attack

Computers of the German Aerospace Centre (DLR) in Cologne have been under an ongoing several month long cyber-attack.

Heartbleed: Bug could affect firewalls, email, mobiles

Heartbleed: Bug could affect firewalls, email, mobiles

Firewalls, email systems and even mobile phones could be at risk from the Heartbleed bug, according to cyber security experts.

Heartbleed: Hackers scanning Web for vulnerability

Heartbleed: Hackers scanning Web for vulnerability

Hacking groups have been detected running automated scans of the Internet in search of Web servers vulnerable to the ‘Heartbleed’ bug.

UK government pays Microsoft to continue Windows XP support

UK government pays Microsoft to continue Windows XP support

The UK government has paid more than £5m to Microsoft to extend Windows XP system support for governmental services.

Journalists most frequent target of state-sponsored hackers

Journalists most frequent target of state-sponsored hackers

Most of the world’s prominent news organisations have been attacked by hackers secretly working for various governments, a study by Google security engineers has revealed.

Call for e-voting in the UK

Call for e-voting in the UK

The UK needs to completely overhaul its voting system introducing new technologies including e-voting to help the public engage with politics, said Electoral Commission Chair Jenny Watson.

Huawei subject to extensive NSA spying operation

Huawei subject to extensive NSA spying operation

The US National Security Agency (NSA) has infiltrated servers of Chinese telecommunications company Huawei, obtaining sensitive information and monitoring the communications of top executives.

Safest wireless protocol more vulnerable than expected

Safest wireless protocol more vulnerable than expected

An international team of researchers has exposed holes in the WPA 2 protocol that has so far been considered the safest system to secure wireless computer networks. 

Ethical hackers test Japan’s cyber-defence

Ethical hackers test Japan’s cyber-defence

Japan has run a large-scale cyber-security exercise, simulating a massive attack on its government departments to spot weaknesses prior to the 2020 Olympics.

Hackers bring down Nato websites

Hackers bring down Nato websites

Nato has been fighting against a string of cyber-attacks over the weekend as hackers disabled several of the organisation’s websites, probably in connection with the Crimea situation.

Nineteen-year-old crowned UK Cyber Security Champion

Nineteen-year-old crowned UK Cyber Security Champion

A 19-year-old student has been crowned as the UK’s Cyber Security Champion after a gruelling two-day national cyber attack simulation.

ATMs still on old software despite end-of-support deadline

ATMs still on old software despite end-of-support deadline

With thousands of ATM’s in the UK still running on the outdated Windows XP software, British banks are now queuing up at Microsoft to negotiate deals for the company to extend support.

NSA denies infecting millions of computers

NSA denies infecting millions of computers

The US National Security Agency has denied allegations it has been infecting millions of computers with malware.

NSA hijacked botnets to use for spying

NSA hijacked botnets to use for spying

The US National Security Agency has been hijacking botnets as a resource for spying, according to a leaked slide by Edward Snowden.

Ukraine under cyber attack

Ukraine under cyber attack

Ukraine’s telecommunications system had been subject to a string of cyber-attacks most likely from Russia, Ukraine’s security agency said.

‘Snake’ cyber espionage toolkit unmasked

‘Snake’ cyber espionage toolkit unmasked

A highly resilient cyber espionage toolkit known as ‘Snake’ has been unmasked by defence contractor BAE Systems.

No point asking China to stop hacking, says Tory MP

No point asking China to stop hacking, says Tory MP

Britain is wasting time asking China to stop cyber attacks, former UN commander and Tory MP Bob Stewart has said.

Encryption solution for manufacturing data resists hacking

Encryption solution for manufacturing data resists hacking

Software that encrypts manufacturing data so as to prevent piracy and data theft will be revealed at a trade show next week.

Recruit geeks to boost cyber-defence, says MP

Recruit geeks to boost cyber-defence, says MP

IT geeks in army reserves could be the solution for the UK to defend the country against growing cyber-threats, a Conservative MP said today.

Labour calls for new cyber-crime powers

Labour calls for new cyber-crime powers

Labour wants new powers that allow security services to crack down on cyber-crimes, but only with extra checks on how sensitive data is used.

Japan calls for international bitcoin regulation

Japan calls for international bitcoin regulation

Japan’s vice finance minister Jiro Aichi has said the bitcoin virtual currency should be regulated on an international level to avoid loopholes and debacles such as this week's closure of a major Bitcoin exchange.

Webcam spying ‘whole new level of violation’

Webcam spying ‘whole new level of violation’

UK spy agency GCHQ has been accused of intercepting and storing webcam images of millions of Yahoo users.

Hackers threaten Brazilian World Cup

Hackers threaten Brazilian World Cup

Hackers have joined protests against the football World Cup to be held in Brazil by threatening to attack the event through jamming websites and data theft.

Contagious airborne Wi-Fi virus demonstrated

Contagious airborne Wi-Fi virus demonstrated

A virus that spreads through Wi-Fi networks as efficiently as a cold spreads between humans has been demonstrated by researchers.

Control system weaknesses ‘easy to discover’ online

Control system weaknesses ‘easy to discover’ online

Data available from mainstream online media could be used to mount a cyber-attack on UK critical national infrastructure.

French rocket engine maker attacked by hackers

French rocket engine maker attacked by hackers

French aerospace company Snecma has been attacked by hackers through an Internet Explorer security gap.

Bitcoin hit by denial-of-service attacks

Bitcoin hit by denial-of-service attacks

Bitcoin has been attacked by unknown hackers sending "mutated" lines of code into the program that runs the virtual currency.

First Spanish language cyber espionage campaign

First Spanish language cyber espionage campaign

The first cyber espionage campaign believed to be started by a Spanish-speaking country has been uncovered by a security software firm.

BAE Systems’ 2014 graduates to expand cyber-security unit

BAE Systems’ 2014 graduates to expand cyber-security unit

BAE Systems plans to recruit more graduates to its cyber and security unit than any other part of its UK business in 2014.

Yahoo customer e-mails hacked in latest security breach

Yahoo customer e-mails hacked in latest security breach

Usernames and passwords of some of Yahoo's e-mail customers have been stolen and used to gather personal information about people they have recently corresponded with.

GCHQ uses Angry Birds to spy on web users

GCHQ uses Angry Birds to spy on web users

American and British intelligence agencies have devised ways to gather data from smartphone applications such as Angry Birds to spy on Internet users, the New York Times has revealed.

Online trust falls to lowest point in three years

Online trust falls to lowest point in three years

Online trust has fallen to its lowest point in three years, with only 55 per cent of British internet users saying they trust companies with their personal data, a survey has revealed.

Critical infrastructure hack data found in public domain

Critical infrastructure hack data found in public domain

Data available from mainstream online media – such as blogs, social networking websites, and specialist online publications – could be used by malevolent agents to mount a cyber-attack on UK critical national infrastructure (CNI), the findings of an investigative assessment to be presented next week will warn.

Military computer in Israel hacked via email

Military computer in Israel hacked via email

Hackers broke into a computer of Israeli defence ministry using an email attachment containing malicious software pretending it had been sent by the country’s Shin Bet security service.

NSA surveillance of 'limited value', says watchdog

NSA surveillance of 'limited value', says watchdog

The NSA's mass phone-call data-gathering programme provided only negligible effects to fight terrorism and should end, the US Privacy and Civil Liberties Oversight Board has concluded.

‘123456’ tops most common password list

‘123456’ tops most common password list

The number sequence '123456' has topped a list of the 25 most commonly used passwords.

Great Firewall glitch redirects users to forbidden site

Great Firewall glitch redirects users to forbidden site

A temporary glitch in China’s Great Firewall has redirected millions of Chinese Internet users to an anti-censorship website meant to be blocked by the system. 

EE rushing to fix router vulnerability

EE rushing to fix router vulnerability

Network operator EE is working on an emergency security upgrade after a researchers discovered a security flaw in its routers.

NSA implants secret technology in spyproof computers

NSA implants secret technology in spyproof computers

The US National Security Agency has implanted secret surveillance software in nearly 100,000 computers around the world to gain access to spy-proof machines.

McAfee pleased Intel dropping name from products

McAfee pleased Intel dropping name from products

Flamboyant millionaire John McAfee has welcomed news that Intel has dropped his name of from its security products.

NSA developing code-cracking quantum computer

NSA developing code-cracking quantum computer

The US National Security Agency is trying to develop a computer that could ultimately break most encryption programs, according to reports.

Syrian Electronic Army hacks Skype's Twitter feed

Syrian Electronic Army hacks Skype's Twitter feed

A hacker collective that supports Syrian President Bashar al-Assad, has claimed credit for hacking Skype's social media accounts.

Cyber-threats of 2014 revealed

Cyber-threats of 2014 revealed

Computer kidnapping, hacking of cars, medical devices or watches, state-sponsored attacks and Obamacare website breaches have been named among the most likely cyber-crimes of 2014.

Surveillance curbs urged by White House-appointed panel

Surveillance curbs urged by White House-appointed panel

A White House-appointed panel has proposed curbs on some key National Security Agency surveillance operations.

Selected it-security features

Analysis: Ukraine grid hack is wake-up call for network operators

Analysis: Ukraine grid hack is wake-up call for network operators

A cyber attack on Ukraine’s power grid that caused a six-hour blackout before Christmas raises concerns about the cyber-preparedness of infrastructure operators around the world.

Cyber-security: organisations vulnerable to new swathe of attacks

Cyber-security: organisations vulnerable to new swathe of attacks

2014 saw Apple, Target, Ebay and Sony become victims of cyber theft, and while experts warn 2015 is set for further disasters, organisations are betting on not being targets rather than addressing the core problems.

Analysis: Public Posturing on Cyber-security Fools No One

Analysis: Public Posturing on Cyber-security Fools No One

Just what kind of political game was China playing in October? On 30 October, senior Chinese officials said that talks with the US were "unhindered" even though they had their differences. The statement was made less than two weeks after others in the Chinese government said that it had stopped talking to the US about cyber-security, following what it called "mistaken US practices".

How many security researchers does it take to hack a light bulb?

How many security researchers does it take to hack a light bulb?

How many cyber-security researchers does it take to hack a light bulb? About six, according to one firm, which has demonstrated that the manufacturers of the growing number of connected devices in our homes appear to have a security blind spot.

Analysis: do router security problems foreshadow IoT hacks?

Analysis: do router security problems foreshadow IoT hacks?

Nothing is safe on the Internet, including your home router. That may already have been hacked – but if the world becomes as connected as companies are hoping, that could be the least of your worries.

Analysis: What lessons can be learned from the Heartbleed fiasco?

Analysis: What lessons can be learned from the Heartbleed fiasco?

The continuing furore over the Heartbleed bug holds important lessons for the IT industry, both about the way it responds to major incidents and also the way software is produced.

The Web at 25 – is it showing its age?

The Web at 25 – is it showing its age?

From humble beginnings the World Wide Web has become the backbone of modern civilisation, but the inability of its creators to foresee its meteoric rise has resulted in shaky foundations.

Embedded world faces up to growing security challenge

Embedded world faces up to growing security challenge

Security has become an even more major concern for the makers of processors and software for embedded systems in the rush to connect them to wireless network – and even the wider Internet. It is driving a rethink in the way devices are designed to prevent network-based attacks and attempts to reverse-engineer the firmware inside.

Healthcare identity assurance - warding off fraud

Healthcare identity assurance - warding off fraud

The healthcare industry is under attack, with imposters, fraudsters and cyber-criminals pretending to be people they are not to acquire personal patient data. But the ID theft clampdown has begun.

The State vs The People

The State vs The People

As the world becomes ever more digitised, the uneasy relationship between personal privacy and national security grows increasingly complex.

Smart grid home security

Smart grid home security

Just who are you inviting into your home with that latest 'smart' technology purchase?

Identity - how safe are you online?

Identity - how safe are you online?

With more and more people living out large parts of their lives online, cybercriminals are finding endless new ways of stealing identities.

How to disarm an infrastructure hacker

How to disarm an infrastructure hacker

The media has been full of reports of cyber-attacks on critical infrastructure, but the fear is that there is far worse to come.

Hacking the Internet - bringing down infrastructure

Hacking the Internet - bringing down infrastructure

Why should hackers try to disable computers when they might be able to set their sights higher? Routers can be just as vulnerable as servers, so why not bring down the entire Internet?

News analysis: Calculating the true cost of cyber-crime

News analysis: Calculating the true cost of cyber-crime

While governments state that cyber security is now one of their top national challenges, the overall cost-impact cyber security is incurring – both in terms of necessary investment and damaging outcomes following an attack – is far from clear.

Firewall vendors revisit core technologies to win market

Firewall vendors revisit core technologies to win market

Firewalls should still be an integral part of any enterprise's cyber security strategy, and vendors of the hardware variety are redoubling their R&D to win more market share.

Cyber security - small firms now in the firing line

Cyber security - small firms now in the firing line

Small businesses need to upgrade their awareness of - and abilities in - cyber security if they are to avoid becoming the 'soft underbelly' of the UK's fights against hackers and cyber threats.

Point-of-sale cyber security: hacking the check-out

Point-of-sale cyber security: hacking the check-out

As point-of-sale systems embrace mainstream software, they will have to deal with the security threats that come with it. After all, what cybercriminal wouldn't go after Windows-based devices handling credit and debit cards?

Ethical hacking: bad in a good way

Ethical hacking: bad in a good way

More and more organisations are being targeted in cyber-attacks, and they must get to know their enemy if they are to protect vital networks. Meet the professional, ethical hacker.

Safety and security convergence - a new era?

Safety and security convergence - a new era?

We are moving toward a world where every connected system is becoming safety critical - so ICT professionals should step up to the principles of ultra-rigorous system design and build.

PIN apps: Hacking on the hoof

PIN apps: Hacking on the hoof

'Grey hat' apps are a new phenomenon in software that enable street hackers to delve into your smartphone and access your data, and more besides.

The dangers of hoax security breaches

The dangers of hoax security breaches

A fake hack attack can be as damaging as a real one and they're becoming increasingly common.

Google Android: how secure is its future?

Google Android: how secure is its future?

How has Google's Android smartphone operating system managed to become so successful?

EU Data legislation amendments

EU Data legislation amendments

Proposed amendments to the EU data privacy laws propose to swap-out carrots for sticks in a redoubled effort to get European organisations to do a better job to protect everyones' data.

Terrorism's invisible propaganda network

Terrorism's invisible propaganda network

Global militant organisations are tapping into the vulnerabilities in mobile technologies for propaganda and recruitment, as well as to filch data for financial gain.

VoIP: voicing security concerns

VoIP: voicing security concerns

Channelling voice calls over IP networks has brought many advantages to enterprise communications, but it also creates some security risks.

IT Security Legislation Guide

IT Security Legislation Guide

IT is one of the most rigorously regulated parts of an organisation, and legislation affecting information security is spearheading the legal changes.

ID access management's cloud challenge

ID access management's cloud challenge

With users accessing systems from ever more obscure points of entry, how do you keep control of access privileges? We look at the software that may have the answer.

Infrastructure cyber attack threat grows

Infrastructure cyber attack threat grows

Despite high-profile attacks, there is still a lack of IT security in key public infrastructure. We ask if it will take a major meltdown to prompt governments to take action.

IT security: isolating the problem

IT security: isolating the problem

PC operating systems are full of security holes, which is why some are now turning to software first developed for 'hidden' computers to better protect them

Data breach – Could Sony have done more?

Data breach – Could Sony have done more?

Data breaches like the one that affected Sony aren’t the end of the world if companies are honest with customers who have been affected.

Cyber-criminals target quake-hit network

Cyber-criminals target quake-hit network

Japan's Internet infrastructure withstood quake and tsunami, but was also left working for cyber-criminals to exploit the anguish of survivors desperate for information

Public eyes gets smart

Public eyes gets smart

Latest-generation CCTV cameras are bringing intelligent observation to some of the world’s most scrutinised cities. E&T zooms in on the innovations.

Cyber terrorism: the reality

Cyber terrorism: the reality

The future threat that the Stuxnet worm poses is a blueprint for attacks on real-world infrastructure, but what is being done to protect industrial control systems and who cares, asks E&T.

Cyber-terrorism concerns growing

Cyber-terrorism concerns growing

How worried should we be about the likelihood of cyber-terrorist attacks launched through the Internet?

Analysis: US Bill puts 'cyber-war' on legislative agenda

Analysis: US Bill puts 'cyber-war' on legislative agenda

Critics say a controversial bill going through Congress would let the US President 'turn off the Internet' if vital services were threatened.

Preparing for the worst

Preparing for the worst

Cyberwar threats are all too real, E&T investigates.

Social engineering: an intruder's tale

Posing as an IT consultant, Colin Greenless performed a penetration test on a FTSE-listed financial services firm. One or two tricks of social engineering gave him free access to some very useful - and very valuable - information.

Analysis: a unified framework for IT security

The IT security sector must take a more unified approach to establishing industry-wide standards for all aspects of secure systems build and maintenance, argues E&T.

You've been hacked

You've been hacked

Cybercrime is a real and growing problem. As the internet grows, so do the numbers of people ready to able and exploit its vulnerabilities.

Killer spam: the business threat

Ever-escalating spam levels are close to tearing the commercial guts out of any business and organisation that relies on email as a primary method of business communication.

IT security's infamous five

Despite all the warnings, all the headlines, and all the headaches, there are some security basics that we just keep leaving undone: Graham Cluley names them.

Security skills: aptly qualified or merely mollified?

IT security specialists want recognition and acclaim from their managers – but gaining the proper qualifications to endorse their status is not clear-cut.

Hardware that blocks hardcore

Bloxx Tru-View could be on the list of organisations worried about what their staff are downloading from the web.

Hacking the human

Any IT security can be circumvented by hackers who target the human factor - but risk can be minimised

Latest Issue

E&T cover image 1607

"As the dust settles after the referendum result, we consider what happens next. We also look forward to an international summer of sport."

E&T jobs

  • Spectrum Technology Analyst

    Ofcom
    • Baldock, Hertfordshire
    • £Competitive Plus Comprehensive Benefits Package

    Ofcom is the independent regulator and competition authority for the UK communications sectors and we are globally respected for the work we do.

    • Recruiter: Ofcom

    Apply for this job

  • Test Engineering Opportunities

    HMGCC
    • Hanslope Park, Milton Keynes
    • Salary offered will depend on skills and experience

    Push incredible innovations beyond their limits. Opportunities for Software, Hardware, EMC, Test and Inspection Engineers!

    • Recruiter: HMGCC

    Apply for this job

  • Development Engineer Opportunities

    HMGCC
    • Hanslope Park, Milton Keynes
    • Salary offered will depend on skills and experience

    At HMGCC, we’re the place where exceptional creativity, ground-breaking ideas and cutting-edge technologies unite.

    • Recruiter: HMGCC

    Apply for this job

  • Head of School of Engineering and Advanced Technology

    Massey University
    • Albany or Palmerston North

    This role offers an outstanding opportunity to lead and further develop a well-established and internationally recognized School.

    • Recruiter: Massey University

    Apply for this job

  • Engineering Support Opportunities

    HMGCC
    • Hanslope Park, Milton Keynes
    • Salary offered will depend on skills and experience

    Working in one of our support roles, you’ll be integral to the creation of some of the most advanced bit of kit in the world.

    • Recruiter: HMGCC

    Apply for this job

  • Programme Manager, Network Resilience

    Energy Networks Association
    • Westminster
    • Competitive salary, dependent on experience

    Co-ordinate the network resilience, emergency planning and the Single Electricity Number (SEN) work in the ENA Engineering team.

    • Recruiter: Energy Networks Association

    Apply for this job

  • Senior Engineer - Configuration

    BAE Systems
    • Surrey, Frimley, England / England, Weymouth, Dorset
    • Negotiable

    Senior Engineer - Configuration Would you like to assist the Combat System Configuration Manager in ensuring that changes to the Common Combat System design are sufficiently assessed, approved, implemented, managed and controlled in accordance with BAE Sy

    • Recruiter: BAE Systems

    Apply for this job

  • System Planning and Investment Engineer

    SSE
    • Reading
    • 37,000 - £55,000 Plus excellent benefits package - salary depending on experience

    System Planning and Investment team act as custodian of the 132kV and EHV distribution network, provide business with technical expertise.

    • Recruiter: SSE

    Apply for this job

  • Chair in Integrated Sensor Technology

    The University of Edinburgh
    • Edinburgh, City of Edinburgh

    The University of Edinburgh is one of the world’s top 20 institutions of higher education.....

    • Recruiter: The University of Edinburgh

    Apply for this job

  • Operations Manager - Access Provisions

    BAE Systems
    • Barrow-In-Furness, Cumbria, England
    • Negotiable

    Operations Manager - Access ProvisionsWould you like to manage and improve the Access Provision across Manufacturing and Construction areas for Astute and Successor platforms? We currently have a vacancy for an Operations Manager - Access Provisions at ou

    • Recruiter: BAE Systems

    Apply for this job

More jobs ▶

Subscribe

Choose the way you would like to access the latest news and developments in your field.

Subscribe to E&T