Special focus: IT security

Laptop with various cables plugged in

There are myriad security challenges facing IT professionals today: personal computers that get hacked, viruses hijack machines, and keystroke loggers steal passwords which end up on public web sites. Yet the amount of security-critical transactions conducted on such systems is steadily increasing.

 

There are also mobile devices such as smartphones and tablet PCs, increasingly being used for critical transactions and projected to replace PCs as the web access device of choice. All these computing devices are in use in modern businesses and their effective management poses a growing challenge to the IT professional.

 

Selected it-security news

New Zealand denies cable surveillance programme

New Zealand denies cable surveillance programme

New Zealand’s Prime Minister John Key denied allegations the country had planned mass surveillance operations as revealed in documents leaked by Edward Snowden.

USA threatened Yahoo with massive fine to acquire user data

USA threatened Yahoo with massive fine to acquire user data

The US government threatened to fine Yahoo $250,000 a day in 2008 if it failed to turn over customer data to intelligence agencies.

Canon printer hacked to play classic game Doom

Canon printer hacked to play classic game Doom

Cyber-security researchers have managed to run the classic 90s computer game Doom on an Internet-enabled Canon printer after hacking its web interface.

Card fraud up despite increased banking security

Card fraud up despite increased banking security

Card fraud hit a record £174.5m in the first half of this year, new figures show, but criminals are relying on social engineering in the face of better security.

Internet of Things needs ‘security first’ architecture

Internet of Things needs ‘security first’ architecture

The Internet of Things needs to be built from the bottom up with a ‘security first’ architecture, according to new research.

Apple pushes two-factor security following photo hack

Apple pushes two-factor security following photo hack

Apple plans additional security features to keep hackers out of user accounts in the face of the recent celebrity photo scandal.

Free cyber-security MOOC course launched

Free cyber-security MOOC course launched

A free online course designed to inspire the next generation of cyber-security professionals supported by the Government has launched.

Hacking behind third of London’s car theft

Hacking behind third of London’s car theft

Car theft has entered the cyber age with more than one in three vehicles currently stolen in London being taken through sophisticated hacking methods, the Home Office has revealed.

Apple says system not breached in celebrity photo hack

Apple says system not breached in celebrity photo hack

Apple says the theft of intimate photos of celebrities including Oscar-winner Jennifer Lawrence was due to a targeted attack on individual iCloud accounts.

International cyber-crime taskforce to be piloted

International cyber-crime taskforce to be piloted

A new international cyber-crime taskforce will be piloted in an attempt to better coordinate the global response to online threats.

Apple service vulnerability responsible for celebrity hack

Apple service vulnerability responsible for celebrity hack

A piece of computer code capable of repeatedly guessing a password has been determined as a likely tool used in the high profile cyber-attack that exposed intimate photographs of tens of celebrities.

Poor coding puts business applications at risk of hacking

Poor coding puts business applications at risk of hacking

Poor code quality is exposing more than two-thirds of retail and financial services applications to cyber-attacks similar to the Heartbleed bug, according to new research.

PlayStation Network back up after denial-of-service attack

PlayStation Network back up after denial-of-service attack

Sony’s PlayStation Network is back online following a cyber-attack that took it down over the weekend.

New game to find next generation of cyber experts

New game to find next generation of cyber experts

A new game that will see players attempt to protect a fictitious aerospace company from hackers is part of a search to find the next generation of cyber-security experts.

FBI issues cyber-attack warning to healthcare providers

FBI issues cyber-attack warning to healthcare providers

US healthcare companies have been subjected to a series of cyber-attacks targeting patient data and intellectual property information, the FBI has said.

First large-scale ‘Heartbleed’ cyber-breach reported

First large-scale ‘Heartbleed’ cyber-breach reported

A cyber-attack that saw hackers steal data on 4.5 million hospital patients is the first known large-scale breach exploiting the ‘Heartbleed’ bug.

Apple starts storing user data on mainland China

Apple starts storing user data on mainland China

Apple has started storing users’ personal data on mainland China for the first time, using servers provided by China Telecom.

Campaign to promote ‘cyber common sense’

Campaign to promote ‘cyber common sense’

A new campaign launched by the National Crime Agency together with the UK government aims to educate users of electronic devices about cyber dangers.

NSA struggles to find employees after spying scandal

NSA struggles to find employees after spying scandal

The US National Security Agency is struggling to attract top technology workers after revelations of widespread eavesdropping practices damaged its reputation.

Anti-spying app heralds end of antivirus era

Anti-spying app heralds end of antivirus era

An Android app that actively scans other apps to determine how risky they are has been launched, promising a new level of user safety.

Massive espionage operation uncovered by cyber firm

Massive espionage operation uncovered by cyber firm

Security researchers at Kaspersky Lab said they have uncovered a massive cyber espionage operation targeting spy agencies and governments in Europe and the Middle East.

US Department of Homeland Security contractor hacked

US Department of Homeland Security contractor hacked

A company contracted to perform background checks for the US Department of Homeland Security said it had been a subject of a most likely state-sponsored cyber-attack.

Russian gang amasses 1.2 billion login credentials

Russian gang amasses 1.2 billion login credentials

Roughly 1.2 billion Internet logins and passwords have been amassed by a Russian criminals, according to a cyber-security firm.

Hacking aircraft satellite systems possible, says researcher

Hacking aircraft satellite systems possible, says researcher

A Spanish cyber-security researcher said he had figured out how to hack satellite communications systems on commercial jets through their Wi-Fi and inflight entertainment systems.

Attack on Canada’s research body linked to ‘Putter Panda’

Attack on Canada’s research body linked to ‘Putter Panda’

The recent hacking attempt on a sensitive Canadian government computer network bears resemblance to attacks mounted by an elite unit of the Chinese army, a cyber-security expert has suggested.

Tor anonymity service users may have been unmasked

Tor anonymity service users may have been unmasked

The group behind Internet-anonymity software Tor has said many of its users may have been identified by government-funded researchers.

USB offers hackers direct route to computers

USB offers hackers direct route to computers

USB technology could be exploited by hackers to load malicious software on computers without triggering security alerts, new research has shown.

BlackBerry to buy encryption tech developer

BlackBerry to buy encryption tech developer

Representatives of privately owned German encryption technology developer Secusmart believe the German government won’t find any obstacles for its prospective sale to smartphone maker BlackBerry.

Bill to ban mass surveillance put to US Senate

Bill to ban mass surveillance put to US Senate

A bill to ban the US government's bulk collection of Americans' telephone records and Internet data has been introduced to Congress.

Israeli missile shield designs stolen by hackers

Israeli missile shield designs stolen by hackers

Companies behind the Israeli Iron Dome missile shield have reportedly been robbed off hundreds of sensitive documents by hackers from China.

Fake ID puts data of Android users at risk

Fake ID puts data of Android users at risk

Sensitive financial and personal information of Android smartphone users could have been accessed by hackers since 2010 due to a previously unknown vulnerability.

Chinese hackers attack Canadian computer system

Chinese hackers attack Canadian computer system

High-level Chinese hackers recently tried to break into a key Canadian computer system, forcing Ottawa to isolate it from the main government network, a senior official said on Tuesday.

Attacks on Android expected to rise

Attacks on Android expected to rise

Ransomware attacks on Android smartphones, preventing users from accessing their gadget unless they pay the attackers, are expected to rise.

Hacking automated homes could help burglars

Hacking automated homes could help burglars

Unsecured automated homes provide an easy access to data about home owners and could be used by burglars seeking access to properties, German researchers have found.

Flaws in privacy software could expose IP addresses

Flaws in privacy software could expose IP addresses

A flaw in an anti-surveillance operating system makes it possible to reveal users’ IP addresses, which are meant to be hidden by the software.

MPs to sue Government over surveillance act

MPs to sue Government over surveillance act

Two MPs will sue the Government over the introduction of the controversial Data Retention and Investigatory Powers Act.

Device protects vehicles from hackers

Device protects vehicles from hackers

Cyber security researchers have developed a prototype device to prevent hackers from launching attacks on travelling cars.

Talk on cracking web anonymity service Tor pulled

Talk on cracking web anonymity service Tor pulled

A talk on how to identify users of the Internet privacy service Tor has been withdrawn from the upcoming Black Hat security conference.

Encrypted calling service extended to 79 countries

Encrypted calling service extended to 79 countries

Customers of a surveillance-dodging mobile calling service can now purchase a fixed rate calling plan that allows them to make encrypted calls across 79 countries, according to the firm.

Cyber-security firm simply seeking publicity, says China

Cyber-security firm simply seeking publicity, says China

A cyber-security firm that claims to have uncovered a state-sponsored hacking group is merely seeking publicity according to China.

US companies warned against ‘Energetic Bear’ virus

US companies warned against ‘Energetic Bear’ virus

The US government has warned critical infrastructure operators to make sure their systems haven’t been infected with malicious software from a hacking group known as Energetic Bear.

Finnish government spied on for years

Finnish government spied on for years

Finland’s government has been subject to a series of ongoing cyber-attacks launched by a foreign government , Finnish officials have revealed.

Home Secretary presses case for snooping powers

Home Secretary presses case for snooping powers

At least 20 cases have been dropped by the National Crime Agency in six months as a result of missing communications data, according to the Home Secretary.

New US ambassador to China raises cyber-espionage

New US ambassador to China raises cyber-espionage

Cyber-theft of trade secrets by China is a threat to US national security, America’s new Ambassador to China Max Baucus said today.

Face recognition password alternative invented

Face recognition password alternative invented

A password alternative that uses a sequence of memorable faces as a key may have cracked the traditional trade-off between memorability and security.

Four in ten organisations obstruct access to personal data

Four in ten organisations obstruct access to personal data

More than four in ten organisations obstruct access to people’s personal data in contravention of European law, a new study has found.

GCHQ to share classified data with industry

GCHQ to share classified data with industry

GCHQ has announced it will start to share classified cyber-threat information with private companies being targeted by increasingly sophisticated hackers.

Deadline to protect against GOZeuS and CryptoLocker looms

Deadline to protect against GOZeuS and CryptoLocker looms

The window for computer users to protect themselves from the GOZeuS and CryptoLocker malware closes at midnight tonight.

The Mask malware employs vintage virus techniques

The Mask malware employs vintage virus techniques

Malware dubbed one of the "most advanced global cyber-espionage operations to date” is using old-school virus techniques, according to new research.

Identify theft checker available as free online service

Identify theft checker available as free online service

Internet users can now check whether or not cyber criminals have stolen any of their personal data and released it online, courtesy of the Identity Leak Checker, a free online service.

Cost of cyber-crime greater than most nations’ GDP

Cost of cyber-crime greater than most nations’ GDP

The cost of cyber-crime is so high that if it were a nation it would be ranked 27th in the world based on revenue, according to a new report.

New cyber-security centre will probe the 'dark web'

New cyber-security centre will probe the 'dark web'

A new cutting-edge cyber-security centre inaugurated in Italy will boost Europe’s cyber defence by scouring the dark internet using one of the most powerful supercomputers in the world.

Vodafone reveals security agencies’ direct link to network

Vodafone reveals security agencies’ direct link to network

Vodafone has disclosed that government agencies in a small number of countries in which it operates have direct access to its network, enabling them to listen in to calls.

New cyber-security certification scheme launched

New cyber-security certification scheme launched

A new cyber-security certification scheme has been launched to help organisations defend themselves against Internet-borne threats.

Email encryption becoming widespread, says Google

Email encryption becoming widespread, says Google

The volume of encrypted email is rising rapidly, according to new data, as providers try to shield their users from government spies and other snoopers.

Electric vehicle charging puts privacy at risk

Electric vehicle charging puts privacy at risk

Regular charging of electric vehicles leaves a data trail which could be exploited by malicious agents, German researchers have said.

Botnet takedown gives public window to clear infections

Botnet takedown gives public window to clear infections

An international operation to take down infrastructure behind two malware families will give computer users a “two-week window” to protect themselves.

Nato drill underlines growing cyber-security concerns

Nato drill underlines growing cyber-security concerns

Nato has run the largest international cyber manoeuvre in the history, underlining the growing importance of cyber warfare in modern-day security.

Hackers are winning the arms race, says survey

Hackers are winning the arms race, says survey

Hackers are more technologically advanced than those trying to stop them, according to a survey of 500 US business executives, law enforcement services and government agencies.

iPhone users hit by ‘ransomware’ type attack

iPhone users hit by ‘ransomware’ type attack

People with iPhones in the UK and Australia have been targeted by hackers who lock their device and demand money to release it.

China bans Windows 8 and screens IT firms for espionage risks

China bans Windows 8 and screens IT firms for espionage risks

Computers of China's government won't be allowed to run Microsoft's Windows 8 operating system, China said, while announcing widespread investigations of IT suppliers to protect national security. 

eBay hackers copied ‘large part’ of 145 million records

eBay hackers copied ‘large part’ of 145 million records

Hackers stole some 145 million user records from eBay servers in what is poised to go down as one of the biggest data breaches in history.

eBay user data compromised by hackers

eBay user data compromised by hackers

eBay is asking users to change their passwords after a cyber attack that compromised a database containing encrypted passwords.

China summons US ambassador over hacking charges

China summons US ambassador over hacking charges

China has summoned the USA’s ambassador after the US accused five Chinese military officers of hacking into American companies to steal trade secrets.

Lockheed Martin under cyber-siege

Lockheed Martin under cyber-siege

US defence giant Lockheed Martin said the number of attacks on its computer systems has quadrupled since 2007.

Samsung’s hacking-proof system safer than BlackBerry's

Samsung’s hacking-proof system safer than BlackBerry's

Samsung’s KNOX system designed for public sector services dealing with sensitive data is secure enough to handle classified information, the UK government has said.

Top eight data breach vulnerabilities revealed

Top eight data breach vulnerabilities revealed

The eight most common IT vulnerabilities that have resulted in data breaches have been revealed by the Information Commissioner’s Office.

Emergency Windows XP update rolled out despite end of support

Emergency Windows XP update rolled out despite end of support

Microsoft has rolled out an urgent update to fix a Windows XP Internet Explorer vulnerability despite having discontinued support for the system this month as hundreds of millions of users haven’t upgraded yet.

Bio-inspired cyber defence system

Bio-inspired cyber defence system

Chemring has developed a network security system mimicking the fight-or-flight fear response of mammals.

Contactless spending tops £100m a month

Contactless spending tops £100m a month

Spending using contactless "tap and go" card payments has topped £100 million in a single month for the first time, industry figures revealed.

Heartbleed bug used against cyber criminals

Heartbleed bug used against cyber criminals

Anti-malware researches have managed to exploit the Heartbleed vulnerability to access protected forums used by hackers to exchange information.

Google admits it scans emails to tailor adverts

Google admits it scans emails to tailor adverts

Google has admitted that incoming and outgoing emails are automatically analysed by software to create targeted ads.

German space agency subject to extensive cyber attack

German space agency subject to extensive cyber attack

Computers of the German Aerospace Centre (DLR) in Cologne have been under an ongoing several month long cyber-attack.

Heartbleed: Bug could affect firewalls, email, mobiles

Heartbleed: Bug could affect firewalls, email, mobiles

Firewalls, email systems and even mobile phones could be at risk from the Heartbleed bug, according to cyber security experts.

Heartbleed: Hackers scanning Web for vulnerability

Heartbleed: Hackers scanning Web for vulnerability

Hacking groups have been detected running automated scans of the Internet in search of Web servers vulnerable to the ‘Heartbleed’ bug.

UK government pays Microsoft to continue Windows XP support

UK government pays Microsoft to continue Windows XP support

The UK government has paid more than £5m to Microsoft to extend Windows XP system support for governmental services.

Journalists most frequent target of state-sponsored hackers

Journalists most frequent target of state-sponsored hackers

Most of the world’s prominent news organisations have been attacked by hackers secretly working for various governments, a study by Google security engineers has revealed.

Call for e-voting in the UK

Call for e-voting in the UK

The UK needs to completely overhaul its voting system introducing new technologies including e-voting to help the public engage with politics, said Electoral Commission Chair Jenny Watson.

Huawei subject to extensive NSA spying operation

Huawei subject to extensive NSA spying operation

The US National Security Agency (NSA) has infiltrated servers of Chinese telecommunications company Huawei, obtaining sensitive information and monitoring the communications of top executives.

Safest wireless protocol more vulnerable than expected

Safest wireless protocol more vulnerable than expected

An international team of researchers has exposed holes in the WPA 2 protocol that has so far been considered the safest system to secure wireless computer networks. 

Ethical hackers test Japan’s cyber-defence

Ethical hackers test Japan’s cyber-defence

Japan has run a large-scale cyber-security exercise, simulating a massive attack on its government departments to spot weaknesses prior to the 2020 Olympics.

Hackers bring down Nato websites

Hackers bring down Nato websites

Nato has been fighting against a string of cyber-attacks over the weekend as hackers disabled several of the organisation’s websites, probably in connection with the Crimea situation.

Nineteen-year-old crowned UK Cyber Security Champion

Nineteen-year-old crowned UK Cyber Security Champion

A 19-year-old student has been crowned as the UK’s Cyber Security Champion after a gruelling two-day national cyber attack simulation.

ATMs still on old software despite end-of-support deadline

ATMs still on old software despite end-of-support deadline

With thousands of ATM’s in the UK still running on the outdated Windows XP software, British banks are now queuing up at Microsoft to negotiate deals for the company to extend support.

NSA denies infecting millions of computers

NSA denies infecting millions of computers

The US National Security Agency has denied allegations it has been infecting millions of computers with malware.

NSA hijacked botnets to use for spying

NSA hijacked botnets to use for spying

The US National Security Agency has been hijacking botnets as a resource for spying, according to a leaked slide by Edward Snowden.

Ukraine under cyber attack

Ukraine under cyber attack

Ukraine’s telecommunications system had been subject to a string of cyber-attacks most likely from Russia, Ukraine’s security agency said.

‘Snake’ cyber espionage toolkit unmasked

‘Snake’ cyber espionage toolkit unmasked

A highly resilient cyber espionage toolkit known as ‘Snake’ has been unmasked by defence contractor BAE Systems.

No point asking China to stop hacking, says Tory MP

No point asking China to stop hacking, says Tory MP

Britain is wasting time asking China to stop cyber attacks, former UN commander and Tory MP Bob Stewart has said.

Encryption solution for manufacturing data resists hacking

Encryption solution for manufacturing data resists hacking

Software that encrypts manufacturing data so as to prevent piracy and data theft will be revealed at a trade show next week.

Recruit geeks to boost cyber-defence, says MP

Recruit geeks to boost cyber-defence, says MP

IT geeks in army reserves could be the solution for the UK to defend the country against growing cyber-threats, a Conservative MP said today.

Labour calls for new cyber-crime powers

Labour calls for new cyber-crime powers

Labour wants new powers that allow security services to crack down on cyber-crimes, but only with extra checks on how sensitive data is used.

Japan calls for international bitcoin regulation

Japan calls for international bitcoin regulation

Japan’s vice finance minister Jiro Aichi has said the bitcoin virtual currency should be regulated on an international level to avoid loopholes and debacles such as this week's closure of a major Bitcoin exchange.

Webcam spying ‘whole new level of violation’

Webcam spying ‘whole new level of violation’

UK spy agency GCHQ has been accused of intercepting and storing webcam images of millions of Yahoo users.

Hackers threaten Brazilian World Cup

Hackers threaten Brazilian World Cup

Hackers have joined protests against the football World Cup to be held in Brazil by threatening to attack the event through jamming websites and data theft.

Contagious airborne Wi-Fi virus demonstrated

Contagious airborne Wi-Fi virus demonstrated

A virus that spreads through Wi-Fi networks as efficiently as a cold spreads between humans has been demonstrated by researchers.

Control system weaknesses ‘easy to discover’ online

Control system weaknesses ‘easy to discover’ online

Data available from mainstream online media could be used to mount a cyber-attack on UK critical national infrastructure.

French rocket engine maker attacked by hackers

French rocket engine maker attacked by hackers

French aerospace company Snecma has been attacked by hackers through an Internet Explorer security gap.

Bitcoin hit by denial-of-service attacks

Bitcoin hit by denial-of-service attacks

Bitcoin has been attacked by unknown hackers sending "mutated" lines of code into the program that runs the virtual currency.

First Spanish language cyber espionage campaign

First Spanish language cyber espionage campaign

The first cyber espionage campaign believed to be started by a Spanish-speaking country has been uncovered by a security software firm.

BAE Systems’ 2014 graduates to expand cyber-security unit

BAE Systems’ 2014 graduates to expand cyber-security unit

BAE Systems plans to recruit more graduates to its cyber and security unit than any other part of its UK business in 2014.

Yahoo customer e-mails hacked in latest security breach

Yahoo customer e-mails hacked in latest security breach

Usernames and passwords of some of Yahoo's e-mail customers have been stolen and used to gather personal information about people they have recently corresponded with.

GCHQ uses Angry Birds to spy on web users

GCHQ uses Angry Birds to spy on web users

American and British intelligence agencies have devised ways to gather data from smartphone applications such as Angry Birds to spy on Internet users, the New York Times has revealed.

Online trust falls to lowest point in three years

Online trust falls to lowest point in three years

Online trust has fallen to its lowest point in three years, with only 55 per cent of British internet users saying they trust companies with their personal data, a survey has revealed.

Critical infrastructure hack data found in public domain

Critical infrastructure hack data found in public domain

Data available from mainstream online media – such as blogs, social networking websites, and specialist online publications – could be used by malevolent agents to mount a cyber-attack on UK critical national infrastructure (CNI), the findings of an investigative assessment to be presented next week will warn.

Military computer in Israel hacked via email

Military computer in Israel hacked via email

Hackers broke into a computer of Israeli defence ministry using an email attachment containing malicious software pretending it had been sent by the country’s Shin Bet security service.

NSA surveillance of 'limited value', says watchdog

NSA surveillance of 'limited value', says watchdog

The NSA's mass phone-call data-gathering programme provided only negligible effects to fight terrorism and should end, the US Privacy and Civil Liberties Oversight Board has concluded.

‘123456’ tops most common password list

‘123456’ tops most common password list

The number sequence '123456' has topped a list of the 25 most commonly used passwords.

Great Firewall glitch redirects users to forbidden site

Great Firewall glitch redirects users to forbidden site

A temporary glitch in China’s Great Firewall has redirected millions of Chinese Internet users to an anti-censorship website meant to be blocked by the system. 

EE rushing to fix router vulnerability

EE rushing to fix router vulnerability

Network operator EE is working on an emergency security upgrade after a researchers discovered a security flaw in its routers.

NSA implants secret technology in spyproof computers

NSA implants secret technology in spyproof computers

The US National Security Agency has implanted secret surveillance software in nearly 100,000 computers around the world to gain access to spy-proof machines.

McAfee pleased Intel dropping name from products

McAfee pleased Intel dropping name from products

Flamboyant millionaire John McAfee has welcomed news that Intel has dropped his name of from its security products.

NSA developing code-cracking quantum computer

NSA developing code-cracking quantum computer

The US National Security Agency is trying to develop a computer that could ultimately break most encryption programs, according to reports.

Syrian Electronic Army hacks Skype's Twitter feed

Syrian Electronic Army hacks Skype's Twitter feed

A hacker collective that supports Syrian President Bashar al-Assad, has claimed credit for hacking Skype's social media accounts.

Cyber-threats of 2014 revealed

Cyber-threats of 2014 revealed

Computer kidnapping, hacking of cars, medical devices or watches, state-sponsored attacks and Obamacare website breaches have been named among the most likely cyber-crimes of 2014.

Surveillance curbs urged by White House-appointed panel

Surveillance curbs urged by White House-appointed panel

A White House-appointed panel has proposed curbs on some key National Security Agency surveillance operations.

Tech companies press Obama on cyber surveillance

Tech companies press Obama on cyber surveillance

Top technology company executives have pressed US President Barack Obama to rein in his government's electronic spying.

Judge rules NSA data collection is likely unlawful

Judge rules NSA data collection is likely unlawful

A judge has ruled that the US National Security Agency's gathering of Americans' phone records is likely unlawful.

Oversight of Huawei boosted over cyber spying fears

Oversight of Huawei boosted over cyber spying fears

Oversight of Chinese telecoms giant Huawei will be increased amid fears its equipment could be used for cyber espionage.

Google tries to block 'clandestine' tracking case

Google tries to block 'clandestine' tracking case

Google is asking the High Court to block a breach of privacy legal action launched against it by a group of British Internet users.

Infrastructure cyber-security institute launched

Infrastructure cyber-security institute launched

A new institute investigating cyber-threats to vital systems that control the UK’s industry and infrastructure has been launched.

Nearly two thirds of web traffic generated by bots

Nearly two thirds of web traffic generated by bots

Almost two thirds of all website traffic is now generated by bots, nearly a third of which are malicious, according to new research.

Police arrest four in £1m cyber-theft by crime ring

Police arrest four in £1m cyber-theft by crime ring

Detectives have arrested four people over a £1m cyber-theft from two banks using computer viruses embedded in emails.

European ministries attacked by Chinese hackers

European ministries attacked by Chinese hackers

Chinese hackers broke into computer systems of five European foreign ministries last September by sending an email containing infected files that loaded malicious codes on the victims’ computers.

Top tech firms urge surveillance restraint

Top tech firms urge surveillance restraint

The world’s top technology companies are urging the USA and other governments to reform their online surveillance practices.

Security agencies spied on online gaming community

Security agencies spied on online gaming community

The US National Security Agency (NSA) and British GSHQ have spied on the international online gaming community, documents leaked by whistle blower Edward Snowden have revealed.

Microsoft disrupts notorious fraud botnet

Microsoft disrupts notorious fraud botnet

Microsoft has disrupted a botnet nearly two million computers strong that costs online advertisers upwards of $2.7m a month.

Android is ‘low-hanging fruit’ for cyber-criminals

Android is ‘low-hanging fruit’ for cyber-criminals

The rapid expansion of the Android operating system is being mirrored by an alarming increase in the amount of malware targeting it, according to an expert.
Arms regulations urged for internet surveillance systems

Arms regulations urged for internet surveillance systems

New arms sale regulations urgently need to be introduced to clamp down on the export of electronic surveillance technology.

Obamacare website too vulnerable, say security experts

Obamacare website too vulnerable, say security experts

Obamacare website puts sensitive data of users at risk, experts have said said, recommending it to be shut down until the problems are addressed.

Yahoo! to encrypt data from next year

Yahoo! to encrypt data from next year

Yahoo! has pledged to encrypt all user information moving between its data centres by the end of the first quarter of next year.

Cyber-attack war game tests London’s banks

Cyber-attack war game tests London’s banks

A fake cyber-attack conducted by a foreign government and a denial-of-service attack disabling users’ networks were among scenarios tested during the Waking Shark II operation.

Credit cards of half million EU users feared hacked

Credit cards of half million EU users feared hacked

Credit card details of some 500,000 European users might be at risk as a marketing firm running award schemes for companies across Europe admitted being a victim of a major hacking attack.

Waking Shark to test London's cyber-preparedness

Waking Shark to test London's cyber-preparedness

Financial companies in the UK’s capital will be put through a war game scenario next week to test how well they can handle an extensive cyber-attack.

Outing of Chinese hacking unit failed to stop attacks

Outing of Chinese hacking unit failed to stop attacks

The outing of a secretive Chinese military hacking unit has failed to halt cyber attacks from the country.

The ‘eBay of vice’ re-opens month after FBI intervention

The ‘eBay of vice’ re-opens month after FBI intervention

A new anonymous Internet marketplace for illegal goods has been opened, featuring the same name and design as the Silk Road but offering better tools to protect users’ anonymity.

Microsoft issues patch to protect Office

Microsoft issues patch to protect Office

Microsoft has released an emergency fix after having learned hackers were exploiting a previously unknown security flaw to attack the popular Office software.

MP's told UK is sleepwalking into a surveillance state

MP's told UK is sleepwalking into a surveillance state

Britain is sleepwalking into becoming a surveillance state as the capacity to collect and analyse data grows MPs were told.

Obamacare system not tested for cyber-security

Obamacare system not tested for cyber-security

The security of the US health insurance website has been put at risk due to a lack of testing before the rushed launch in early October.

Code protecting emails against spying to be made public

Code protecting emails against spying to be made public

A programming code that makes emails shut down when they are at risk of being intercepted will be released to the public to improve communication security.

Contactless cards can be hacked with off-the shelf technology

Contactless cards can be hacked with off-the shelf technology

Hackers can intercept data transmitted between contactless cards and payment terminals using easily available and portable electronic devices, a study of Surrey University researchers has found.

Briton hacks networks of Nasa and US military

Briton hacks networks of Nasa and US military

A 28-year-old hacker from Suffolk, UK, has been arrested by US authorities for penetrating thousands of US military computer systems, aiming to steal confidential data.

Germany wants Internet shielding to counteract spying

Germany wants Internet shielding to counteract spying

Germany’s major telecoms provider is negotiating with other telecoms companies to join forces to protect local Internet from foreign influences.

Biometric cryptographic system to 'eradicate cybercrime'

Biometric cryptographic system to 'eradicate cybercrime'

A new fingerprint scanning biometric authentication system that developers say could eradicate cybercrime has been unveiled.

US outlines cyber security standards for companies

US outlines cyber security standards for companies

The US National Institute of Standards and Technology (NIST) has put forward a draft of voluntary standards to help critical industries prevent cyber-attacks.

NSA collects contacts to map connections of suspects

NSA collects contacts to map connections of suspects

The US National Security Agency collects hundreds of millions of contact lists from personal email and instant messaging accounts.

Public sector mobile security guidance released

Public sector mobile security guidance released

New security guidance for public sector IT professionals on how to safely deploy the latest mobile devices has been released.

Secret web-user tracking more widespread than expected

Secret web-user tracking more widespread than expected

Websites use hidden scripts to extract device fingerprints from users’ browsers without the users’ consent, a Belgian study has found.

Effective response to hacking as important as defence

Effective response to hacking as important as defence

In the wake of the recent hacking attack on Adobe Systems, cyber-security experts have highlighted how companies having an incident response plan in place is as important as preparation against such attacks.

New crime agency targets the ‘deep web’

New crime agency targets the ‘deep web’

The head of the new National Crime Agency has warned criminals using the “deep web” they cannot hide from police.

Adobe source code stolen by hackers

Adobe source code stolen by hackers

Adobe Systems says hackers have stolen source code to some of its most popular software and data about millions of its customers.

Belgians seek response over claims GCHQ hacked telecoms firm

Belgians seek response over claims GCHQ hacked telecoms firm

Britain has been asked by Belgium to respond to claims GCHQ hacked in the IT network of Belgian telecoms provider Belgacom.

UK military looks for IT experts to bolster cyber protection

UK military looks for IT experts to bolster cyber protection

UK Defence Secretary Philip Hammond has appealed to Britain's top IT experts to join the newly established Joint Cyber Reserve Unit to help protect the UK's computer networks from cyber-attacks.

US intelligence chiefs open to surveillance controls

US intelligence chiefs open to surveillance controls

Intelligence chiefs say they are open to measures to increase oversight of the US government’s electronic eavesdropping programs.

Microsoft issues patch to fix Internet Explorer security gap

Microsoft issues patch to fix Internet Explorer security gap

Microsoft has released an emergency software fix for Internet Explorer after hackers exploited a security flaw in the browser to attack an unknown number of users.

IT systems at risk due to lax BYOD attitude, survey says

IT systems at risk due to lax BYOD attitude, survey says

A quarter of UK manufacturing companies are putting their IT systems at risk by allowing employees to use their own personal devices at work but not having a formal bring-your-own-device (BYOD) policy in place, according to research carried out by cloud computing specialist Intrinsic Technology.

NSA can crack or circumvent common encryption

NSA can crack or circumvent common encryption

The USA’s National Security Agency has secretly developed the ability to crack or circumvent commonplace Internet encryption.

Large quantum cryptography networks possible

Large quantum cryptography networks possible

A breakthrough in quantum cryptography could allow large scale communication networks using the technology to be developed.

IT industry ‘losing battle’ against state-backed attacks

IT industry ‘losing battle’ against state-backed attacks

More than half of senior IT security professionals believe the industry is losing the battle against state-sponsored attacks.

New York Times attacked by Syrian hackers

New York Times attacked by Syrian hackers

The Syrian Electronic Army (SAE) has broken into systems of an Australian Internet company managing addresses of some of the world’s most prominent news websites.

Windows 8 prone to cyber-attacks, German experts say

Windows 8 prone to cyber-attacks, German experts say

A German government technology agency has warned that new security technology in computers running Microsoft's Windows 8 operating system may actually make PCs more vulnerable to cyber threats.

New app helps prevent phishing

New app helps prevent phishing

Researchers from the Royal Holloway University have developed a prototype app that can help protect users against phishing attacks.

NSA broke privacy rules thousands of times a year

NSA broke privacy rules thousands of times a year

The USA’s National Security Agency broke privacy rules or overstepped its authority thousands of times each year since 2008.

Syrian hackers use novel method to target news sites

Syrian hackers use novel method to target news sites

Hackers from the Syrian Electronic Army have simultaneously targeted several news sites by breaching a single supplier.

Germany wants to boost European IT to fight US espionage

Germany wants to boost European IT to fight US espionage

Germany’s government wants to foster Europe’s technology companies to make them stronger competitors to their US counterparts.

GCHQ launches new cyber-attack response schemes

GCHQ launches new cyber-attack response schemes

GCHQ has launched two cyber incident response initiatives to help UK businesses who suffer cyber-attacks.

UK losing war against cyber-crime, say MPs

UK losing war against cyber-crime, say MPs

The UK is losing the war against Internet crime, an influential group of MPs has warned.

China-US cyber security talks make progress

China-US cyber security talks make progress

Talks between China and the US on cyber security have gone well, Chinese state media said today.

China ready to discuss cyber security with US

China ready to discuss cyber security with US

China says it is ready to discuss strengthening cyber security at a top-level forum with US officials next week.

MoD announces cyber warfare industry partnership

MoD announces cyber warfare industry partnership

The Ministry of Defence has announced a new partnership with its major contractors to bolster the UK’s resistance to cyber warfare.

Cyber-reservists to avoid fitness testing

Cyber-reservists to avoid fitness testing

Computer experts looking to join the military reserve force to help fight cyber terrorism will be allowed to avoid tough fitness testing, Defence Secretary Philip Hammond said today.

Cyber defence lags behind technology in the Middle East

Cyber defence lags behind technology in the Middle East

The energy sector in the Middle East is extremely prone to cyber-attacks, said DNV KEMA, world’s leading energy consultancy.

Huawei telecoms decision criticised by UK watchdog

Huawei telecoms decision criticised by UK watchdog

China's Huawei Technologies should not have been permitted to become embedded in Britain's critical network infrastructure without the knowledge and scrutiny of ministers, UK’s lawmakers said on Thursday.

China cyber security chief makes US hacking claim

China cyber security chief makes US hacking claim

China's top Internet security official says he has "mountains of data" pointing to extensive US hacking aimed at China.

US and Australian security secrets hacked by China

US and Australian security secrets hacked by China

Chinese hackers have allegedly stolen designs for dozens of US weapons systems and blueprints for Australia's new spy HQ.

£7.5m for cyber security training centres

£7.5m for cyber security training centres

Two new centres of excellence funded by the Government will train the next generation of cyber security experts.

China dismisses US cyber-espionage claims

China dismisses US cyber-espionage claims

China has dismissed the US’s “groundless accusations” of using cyber-espionage to acquire military technology.

UK security skills gap aiding cyber crime

UK security skills gap aiding cyber crime

A lack of information security skills among the UK’s IT workforce is hampering the fight against cyber criminals, according to the latest research from the IET.

Cyber-attacks on businesses soar in past year

Cyber-attacks on businesses soar in past year

The number of cyber-attacks hitting businesses has soared in the past year, Government-commissioned research revealed today.

Oracle releases patch to fix Java vulnerabilities

Oracle releases patch to fix Java vulnerabilities

Oracle has released a major security update for the version of Java programming language that runs inside Web browsers.

InfoSec Skills launch cyber security competitions

InfoSec Skills launch cyber security competitions

InfoSec Skills will launch competitions testing IT security skills of business leaders as part of the Cyber Security Challenge.

Cyber attacks hit businesses once every three minutes

Cyber attacks hit businesses once every three minutes

Companies experience cyber attacks up to once every three minutes, a report says.

Cyber-security experts demonstrate Java attack

Cyber-security experts demonstrate Java attack

Cyber-security experts yesterday demonstrated how the latest zero-day vulnerabilities in Java could be used in a cyber-attack.

North Korea social networks hacked

North Korea social networks hacked

Hackers have apparently broken into at least two of North Korea's government-run online sites.

'Fusion cell' cyber security centre launched

'Fusion cell' cyber security centre launched

Cyber security experts from industry are to operate alongside the intelligence agencies for the first time.

Chinese university linked with PLA hacking cyber-unit

Chinese university linked with PLA hacking cyber-unit

Faculty members at a top Chinese university have collaborated for years with an army unit accused of hacking Western targets.

S Korea cyber attack may not have come from China

S Korea cyber attack may not have come from China

This week's cyber-attack on South Korean broadcasters and banks may not have originated in China.

South Korea cyber attack traced to China server

South Korea cyber attack traced to China server

A hacking attack on three South Korean broadcasters and two major banks has been identified by most commentators as North Korea.

BBC Twitter accounts hijacked by pro-Syrian hackers

BBC Twitter accounts hijacked by pro-Syrian hackers

Several official BBC Twitter accounts were hacked today by what appeared to be pro-Syrian government hackers.

North Korea hackers blamed for South Korea shutdown

North Korea hackers blamed for South Korea shutdown

Computer networks at two major South Korean banks and three top TV broadcasters went into mass shutdown today.

North Korea blames US for cyber attack

North Korea blames US for cyber attack

North Korea has blamed South Korea and the United States for cyber attacks that temporarily shut down websites.

Cyber security competition winner announced

Cyber security competition winner announced

Cyber experts said it was important to recruit a broad range of people after a chemist won a cyber security competition.

US report: cyber-attacks bigger threat than terrorism

US report: cyber-attacks bigger threat than terrorism

Cyber-attacks and cyber espionage have supplanted terrorism as the top threats to the United States, says a new report.

Now use your phone as a secure door-key

Now use your phone as a secure door-key

Researchers at the Fraunhofer Institute for Secure IT have developed security software to enable the use of Android smartphones for access control.

Crypto card means Blackberry is Classified secure

Crypto card means Blackberry is Classified secure

Security firm Secusmart has developed a crypto plug-in for the Blackberry 10 smartphone which, it claims, turns it into the first widely-available smartphone to meet government-level Classified security levels.

Orange and Morpho launch secure m-health service

Orange and Morpho launch secure m-health service

Orange and security firm Morpho have announced a mobile identity management system specifically designed for the healthcare sector.

Vodafone and BAE announce cyber-security product

Vodafone and BAE announce cyber-security product

Vodafone has teamed up with defence firm BAE Systems to develop new technology to protect businesses against cyber-attacks.

Government plans cyber reserve defence force

Government plans cyber reserve defence force

The Ministry of Defence is to recruit a new force of "cyber reservists" to bolster the uK's online defences.

IT experts urged to help police

IT experts urged to help police

IT specialists should consider becoming police volunteers to help stop cyber criminals, the Security Minister is to suggest.

Huawei working with hacker critics

Huawei working with hacker critics

Chinese telecoms equipment manufacturer Huawei is working with one of its toughest critics to reduce its hacking vulnerabilities

William Hague issues warning on global cybercrime

William Hague issues warning on global cybercrime

William Hague will warn a conference in Budapest that cybercrime is one of the greatest challenges facing the world.

Cyber security experts take part in EU's simulated DDoS attack

Cyber security experts take part in EU's simulated DDoS attack

Cyber security experts across Europe are taking part in the EU's biggest cyber security exercise.

GCHQ launches cyber security competition

GCHQ launches cyber security competition

GCHQ has unveiled an online security competition to identify future espionage recruits and raise awareness of cyber attacks.

Microsoft warns of Internet Explorer flaw

Microsoft warns of Internet Explorer flaw

Microsoft has warned a newly discovered bug in its Internet Explorer web browser makes PCs vulnerable to attack by hackers.

Cyber Security Challenge finalists pay visit to GCHQ

Cyber Security Challenge finalists pay visit to GCHQ

Finalists of the Cyber Security Challenge UK competition have visited GCHQ to find out more about cyber security.

Sir Tim Berners-Lee denies Internet 'off-switch'

Sir Tim Berners-Lee denies Internet 'off-switch'

The inventor of the World Wide Web has denied there is an 'off' switch that could turn off the Internet across the globe.

Second Lulzsec hacker arrested over Sony Pictures breach

Second Lulzsec hacker arrested over Sony Pictures breach

A second suspected member of LulzSec was arrested on charges he took part in a computer breach of Sony Pictures Entertainment.

Cyber campaign against Middle East expands

Cyber campaign against Middle East expands

A cyber espionage campaign targeting Iran and other parts of the Middle East has widened, according to security experts.

Intel experts working to protect cars from viruses

Intel experts working to protect cars from viruses

Intel security experts are working on finding ways to protect automobiles from electronic bugs and computer viruses.

Blizzard Battle.net accounts hacked

Blizzard Battle.net accounts hacked

Gaming company Blizzard has confirmed that hackers have stolen some account details of its users.

South Korea makes arrests after 8.7 million KT users hacked

South Korea makes arrests after 8.7 million KT users hacked

South Korean police have arrested two computer programmers on suspicion of hacking personal data of 8.7 million KT subscribers.

Cyber espionage campaign targeting Middle East uncovered

Cyber espionage campaign targeting Middle East uncovered

A cyber espionage campaign targeting Iran and other Middle Eastern countries has been uncovered by security experts.

DNSChanger malware could blackout 300000 web users

DNSChanger malware could blackout 300000 web users

Up to 300,000 computer users around the world are at risk of losing internet access due to a computer virus.

BT extends cyber security deal with MoD

BT extends cyber security deal with MoD

The Ministry of Defence has extended its cyber security agreement with BT as it defends its networks against increasing threats.

LulzSec hackers admit cyber attacks

LulzSec hackers admit cyber attacks

LulzSec hackers have admitted they were behind cyber attacks against the CIA, the NHS and the Serious Organised Crime Agency.

Ofcom to crack down on internet piracy

Ofcom to crack down on internet piracy

Internet service providers will start warning their customers who illegally download files as Ofcom cracks down on online piracy.

LinkedIn works with FBI on password hack

LinkedIn works with FBI on password hack

LinkedIn says it is working with the FBI after the theft of around 6.5 million member passwords.

UK law firms must tackle cybercrime

UK law firms must tackle cybercrime

Digital risk management and investigations consultancy Stroz Friedberg has cautioned UK law firms that their failure to tackle online security will leave clients vulnerable to hackers.

LinkedIn suffers password hack of 6.5 million accounts

LinkedIn suffers password hack of 6.5 million accounts

Social networking site LinkedIn has warned millions of users to reset their passwords after security information was stolen.

Global effort needed to fight ‘cyber terrorism’

Global effort needed to fight ‘cyber terrorism’

Governments need to work together to stop cyber-attacks and operating systems must be redesigned, Eugene Kaspersky, the founder of Kaspersky Lab says.

BBC target of ‘sophisticated cyber-attack’

BBC target of ‘sophisticated cyber-attack’

The BBC’s boss says the company suffered a ‘sophisticated cyber-attack’ after an attempt by Iran to undermine its Persian Service.

NASA says it was hacked 13 times last year

NASA says it was hacked 13 times last year

NASA has said that hackers gained access to mission-critical projects in 13 major network breaches last year.

Cybercriminals cast a wide net in January

Cybercriminals cast a wide net in January

Network security company GFI Software released its VIPRE report showcasing the ten prevalent threat detections encountered by its GFI VIPRE Antivirus users in January 2012. The malware attacks target a range of victims including gamers, small businesses and government organisations.

Voice biometrics plays key role in security

Voice biometrics plays key role in security

A report from fraud prevention company ValidSoft and research house Opus Research predicts that the global number of registered voiceprints will increase from 10 million to over 25 million in 2015.
Children's websites targeted by hackers

Children's websites targeted by hackers

Anti-virus company Avast has revealed hackers are now targeting children’s gaming websites to spread malware and hack into the home network.

Firefox ‘silent’ update ‘gives access’ to hackers

Firefox ‘silent’ update ‘gives access’ to hackers

Mozilla’s reported plan to implement ‘silent’ background updates in the upcoming version of Firefox 10 has been questioned by security company Lieberman Software.

Over half of all spam messages come from Asia

Over half of all spam messages come from Asia

IT security firm Sophos has revealed the top twelve countries responsible for spam messages from its Q3 2011 report, the ‘Dirty Dozen'.

Malware attacks follow Gaddafi death interest

Malware attacks follow Gaddafi death interest

The death of Libyan dictator Muammar Gaddafi is driving huge public interest in viewing photos and videos of his last moments - and providing cybercriminals with an opportunity to ensnare the morbidly curious surfers.

Promoted Tweets are exploited, claims Sophos

Promoted Tweets are exploited, claims Sophos

Spammers will take advantage of Twitter’s enablement of user targeting by UK brands, warns information security firm Sophos.

Brooklands College tackles Conficker outbreak with Sophos

Brooklands College tackles Conficker outbreak with Sophos

Brooklands College will be using IT security firm Sophos for its two-site network in Surrey and Kent against an increase in viruses and malware threats.

Workplace social networking ‘risk to personal security’ say employees

Workplace social networking ‘risk to personal security’ say employees

Seventeen per cent of UK employees consider accessing social networks from the workplace ‘a major risk’ to enterprise security – and many are calling for clearer guidelines on social media usage on behalf of their employers.

Iran internet users spied on by hackers, report says

Iran internet users spied on by hackers, report says

Hackers spied on about 300,000 internet users in Iran last month after stealing security certificates from a Dutch IT firm.

WikiLeaks website target of cyber attack

WikiLeaks website target of cyber attack

WikiLeaks has been the target of a cyber attack as it released thousands of previously unpublished U.S. diplomatic cables.

Sensitive file transfer imperatives ‘causing security practice breaches’

Sensitive file transfer imperatives ‘causing security practice breaches’

Increased pressure to improve the speed and security of file transfers from customers and partners is creating vulnerabilities in enterprise security procedure.

Linux competition launched by Cyber Security Challenge UK

Linux competition launched by Cyber Security Challenge UK

The Cyber Security Challenge UK has launched a competition challenging participants to detect hacker activity on Linux systems.

Defcon hackers steal most data from Oracle

Defcon hackers steal most data from Oracle

Hackers at the Defcon convention managed to trick employees at some of the largest U.S. companies to help them steal data.

China paper dismisses McAfee hacking allegations

China paper dismisses McAfee hacking allegations

China's top paper has dismissed as "irresponsible" suggestions that the country is linked to large-scale internet hacking.

Smartphone upsurge causing ructions for IT managers

Smartphone upsurge causing ructions for IT managers

Smartphones are overtaking laptops as the mobile device of choice for enterprise workforces, bringing another headache for IT departments to contend with. 

SAP to release software security patch

SAP to release software security patch

Business software company SAP says it will release a patch to customers to fix a security flaw in its software.

N.Korean hackers hired to attack S.Korea game network

N.Korean hackers hired to attack S.Korea game network

More than 30 North Korean hackers were hired by a South Korean crime ring to steal personal data from South Korean gamers.

McAfee uncovers biggest series of cyber attacks

McAfee uncovers biggest series of cyber attacks

McAfee has uncovered the biggest series of cyber attacks to date, involving 72 organisations targeted including the UN.

Teen on cyber-hacking charge released on bail

Teen on cyber-hacking charge released on bail

A teenager believed to be a leading member of the Anonymous and LulzSec hacking groups has been released on bail.

XP target of cyber rootkits infections

XP target of cyber rootkits infections

Un-patched and often pirated versions of Windows XP are a main target for rootkits infections, according to the AVAST Virus Lab.

Caller ID gets legibility boost

Caller ID gets legibility boost

It should be much easier for blind and visually impaired mobile users to tell who is calling them if a system being showcased at this month’s Mobile World Congress in Barcelona takes off.

IT security must innovate or die, NetEvents conference told

IT security must innovate or die, NetEvents conference told

Network security companies must innovate or die

Governance regains central role in IT security

Governance regains central role in IT security

Governance is playing an increasingly important part of information security within enterprises.

Spot market could re-open after cyber attack

Spot market could re-open after cyber attack

The spot market in European Union emissions permits may re-open next week following a cyber attack that resulted in nearly 30 million euros (£26 million) of carbon permits being stolen.

Emerging tech will flip IT’s value proposition

Emerging tech will flip IT’s value proposition

Chief information officers must ‘re-imagine’ IT to support growth and competitive advantage, say findings from the ‘2011 CIO Agenda’ survey.

110,000 new IT professionals needed this year

110,000 new IT professionals needed this year

Half a million required to keep up with projected UK demand over the next five years, says e-Skills survey.

Security spend resilience due to changing endpoint IT

Security spend resilience due to changing endpoint IT

The value of the enterprise network and data security market is set to exceed $10bn by 2016.

Female IT security student numbers ‘increasing’

Female IT security student numbers ‘increasing’

Registration for the SANS London 2010 event shows an 11 per cent increase of women students for Security 560, ‘Penetration Testing and Ethical Hacking’ providing further evidence that more women are breaking into the sector, and may now account for 17 per cent of IT security practitioners.

Cyber security skills search starts

What’s been launched as the UK’s ‘first hunt for future cyber security professionals’ has begun.

IT dept ‘usual suspects’ for data snooping: survey

Up to 35 per cent of organisations suspect that their most sensitive internal information has been illicitly passed over to competitors – most probably by former employees.

Google ditches Windows over security concerns

Google is urging its employees to dump Microsoft Windows in favour of Mac OS and Linux citing security concerns, say reports.

Secure remote access continues to be top concern

Twenty-five per cent of IT administrators have voted ‘Securing remote access’ as the issue that most keeps them a peaceful night’s sleep, while 15 per cent said ‘keeping virus definitions up to date’ was their second biggest nocturnal concern.

ISF starts work on new IT security standard

The Information Security Forum (ISF) has launched a series of initiatives designed to lead toward a industry standard for managing information security requirements for enterprise third-party relationships.

Kaspersky PURE could become 'open to third parties'

Kaspersky Lab is considering developing its new PURE home security software to become an operating platform for which approved third parties will be able to develop updates and plug-ins.

New online threats ‘will come through the Cloud’

Social media and Cloud Computing have increased the vulnerability of UK companies and public sector organisations to new cyber threats, with hacking and denial of service attacks having doubled since 2008.

Swings-and-roundabouts year for info security pros

More than half of information security professionals received salary increases in 2009, according to the surveyed for the (ISC)2 2010 Career Impact Survey, while less than five per cent of participants lost their jobs.

‘Art of War’ helps thwart cybercrime

The art of war, and the art of information security, are closely aligned, claims a new book ‘Assessing Information Security: Strategies, Tactics, Logic and Framework’ that applies the principles of Sun Tzu’s classic text to online threat combat.

Cyber criminals will target World Cup fans

South Africa’s hosting of the 2010 Soccer World Cup will make it the target of an intense cybercrime wave in the lead-up to the FIFA tournament in June, security experts have warned.

Regulation best way to tackle cybercrime wave

Kaspersky Lab CEO Eugene Kaspersky has called for more global regulation in the fight against online threats. Speaking to E&T at InfoSecurity Europe 2009, Kaspersky said that the era of the unregulated Internet has passed, and that the notion of unregulated public networks was not realistic when economies could be wrecked by cyber-criminals.

Firewall pronounced 'dead' at InfoSecurity Europe

The Internet firewall is 'dead', according to IT security start-up Palo Alto Networks. Speaking live on the third of E&T's exclusive video bulletins from Infosecurity Europe 2009, director of corporate marketing Franklyn Jones says that with enterprises increasing their use of online applications, the traditional concept of a protective traffic gateway needs reinvention.

Apple users still complacent about security

Cyber-criminals are continuing to show increasing interest in targeting the Apple Mac community and users can expect a slew of new Mac-specific malware and Trojans, Sophos senior technology consultant Graham Cluley has warned, speaking exclusively in the fourth of E&T magazine's video bulletins from InfoSecurity Europe.

Cybercriminals are 'new business competition'

Cybercriminal gangs should be now be seen as commercial rivals, security firm Aladdin Systems is claiming. Speaking on the first day of InfoSecurity Europe 2009, Iftach Ian Amit, the company's director of security research, said that online malevolents should be regarded as commercial opposition every bit as well organised as legitimate businesses.

1.9m malware-infected computers ‘controlled by cybercriminals’ claim

A network of 1.9m malware-infected computers has been identified by web gateway vendor Finjan’s Malicious Code Research Center (MCRC). Corporate, government, and consumer computers around the world were infected by the malware, the company claims.

Security flouted to ‘get the job done’

Companies are leaving themselves vulnerable to employees’ ‘purposeful flouting’ of the rules when it comes to information security, claims a survey by certification company (ISC)2.

Employers using social networks to check recruitees

Over 30 per cent of human resources departments and business managers admit to searching for potential and current employees’ social networking profiles for information about their background and behaviour - and 24 per cent of those say that they have been put off by something they have found.

Anonymous proxies still ‘major security concern’

Ninety per cent of IT managers in the educational sector view anonymous proxies to be a problem, compared with 51 per cent in the private sector. Anonymous proxies are the most popular way to bypass an organisation’s Internet filtering: thus connected, users can surf any website unmonitored, even if it should have been blocked by a Web filter.

‘Application security’ tops Google IT security searches

‘Application security’ tops a global list of most commonly-searched-for IT security terms according to an analysis of current Google search trends and volume statistics by risk management firm ArmstrongAdams. Data loss and PCI DSS ranked highest in terms of UK originated searches in December 2008.

Selected it-security features

How many security researchers does it take to hack a light bulb?

How many security researchers does it take to hack a light bulb?

How many cyber-security researchers does it take to hack a light bulb? About six, according to one firm, which has demonstrated that the manufacturers of the growing number of connected devices in our homes appear to have a security blind spot.

Analysis: do router security problems foreshadow IoT hacks?

Analysis: do router security problems foreshadow IoT hacks?

Nothing is safe on the Internet, including your home router. That may already have been hacked – but if the world becomes as connected as companies are hoping, that could be the least of your worries.

Analysis: What lessons can be learned from the Heartbleed fiasco?

Analysis: What lessons can be learned from the Heartbleed fiasco?

The continuing furore over the Heartbleed bug holds important lessons for the IT industry, both about the way it responds to major incidents and also the way software is produced.

The Web at 25 – is it showing its age?

The Web at 25 – is it showing its age?

From humble beginnings the World Wide Web has become the backbone of modern civilisation, but the inability of its creators to foresee its meteoric rise has resulted in shaky foundations.

Embedded world faces up to growing security challenge

Embedded world faces up to growing security challenge

Security has become an even more major concern for the makers of processors and software for embedded systems in the rush to connect them to wireless network – and even the wider Internet. It is driving a rethink in the way devices are designed to prevent network-based attacks and attempts to reverse-engineer the firmware inside.

Healthcare identity assurance - warding off fraud

Healthcare identity assurance - warding off fraud

The healthcare industry is under attack, with imposters, fraudsters and cyber-criminals pretending to be people they are not to acquire personal patient data. But the ID theft clampdown has begun.

The State vs The People

The State vs The People

As the world becomes ever more digitised, the uneasy relationship between personal privacy and national security grows increasingly complex.

Smart grid home security

Smart grid home security

Just who are you inviting into your home with that latest 'smart' technology purchase?

Identity - how safe are you online?

Identity - how safe are you online?

With more and more people living out large parts of their lives online, cybercriminals are finding endless new ways of stealing identities.

How to disarm an infrastructure hacker

How to disarm an infrastructure hacker

The media has been full of reports of cyber-attacks on critical infrastructure, but the fear is that there is far worse to come.

Hacking the Internet - bringing down infrastructure

Hacking the Internet - bringing down infrastructure

Why should hackers try to disable computers when they might be able to set their sights higher? Routers can be just as vulnerable as servers, so why not bring down the entire Internet?

News analysis: Calculating the true cost of cyber-crime

News analysis: Calculating the true cost of cyber-crime

While governments state that cyber security is now one of their top national challenges, the overall cost-impact cyber security is incurring – both in terms of necessary investment and damaging outcomes following an attack – is far from clear.

Firewall vendors revisit core technologies to win market

Firewall vendors revisit core technologies to win market

Firewalls should still be an integral part of any enterprise's cyber security strategy, and vendors of the hardware variety are redoubling their R&D to win more market share.

Cyber security - small firms now in the firing line

Cyber security - small firms now in the firing line

Small businesses need to upgrade their awareness of - and abilities in - cyber security if they are to avoid becoming the 'soft underbelly' of the UK's fights against hackers and cyber threats.

Point-of-sale cyber security: hacking the check-out

Point-of-sale cyber security: hacking the check-out

As point-of-sale systems embrace mainstream software, they will have to deal with the security threats that come with it. After all, what cybercriminal wouldn't go after Windows-based devices handling credit and debit cards?

Ethical hacking: bad in a good way

Ethical hacking: bad in a good way

More and more organisations are being targeted in cyber-attacks, and they must get to know their enemy if they are to protect vital networks. Meet the professional, ethical hacker.

Safety and security convergence - a new era?

Safety and security convergence - a new era?

We are moving toward a world where every connected system is becoming safety critical - so ICT professionals should step up to the principles of ultra-rigorous system design and build.

PIN apps: Hacking on the hoof

PIN apps: Hacking on the hoof

'Grey hat' apps are a new phenomenon in software that enable street hackers to delve into your smartphone and access your data, and more besides.

The dangers of hoax security breaches

The dangers of hoax security breaches

A fake hack attack can be as damaging as a real one and they're becoming increasingly common.

Google Android: how secure is its future?

Google Android: how secure is its future?

How has Google's Android smartphone operating system managed to become so successful?

EU Data legislation amendments

EU Data legislation amendments

Proposed amendments to the EU data privacy laws propose to swap-out carrots for sticks in a redoubled effort to get European organisations to do a better job to protect everyones' data.

Terrorism's invisible propaganda network

Terrorism's invisible propaganda network

Global militant organisations are tapping into the vulnerabilities in mobile technologies for propaganda and recruitment, as well as to filch data for financial gain.

VoIP: voicing security concerns

VoIP: voicing security concerns

Channelling voice calls over IP networks has brought many advantages to enterprise communications, but it also creates some security risks.

IT Security Legislation Guide

IT Security Legislation Guide

IT is one of the most rigorously regulated parts of an organisation, and legislation affecting information security is spearheading the legal changes.

ID access management's cloud challenge

ID access management's cloud challenge

With users accessing systems from ever more obscure points of entry, how do you keep control of access privileges? We look at the software that may have the answer.

Infrastructure cyber attack threat grows

Infrastructure cyber attack threat grows

Despite high-profile attacks, there is still a lack of IT security in key public infrastructure. We ask if it will take a major meltdown to prompt governments to take action.

IT security: isolating the problem

IT security: isolating the problem

PC operating systems are full of security holes, which is why some are now turning to software first developed for 'hidden' computers to better protect them

Data breach – Could Sony have done more?

Data breach – Could Sony have done more?

Data breaches like the one that affected Sony aren’t the end of the world if companies are honest with customers who have been affected.

Cyber-criminals target quake-hit network

Cyber-criminals target quake-hit network

Japan's Internet infrastructure withstood quake and tsunami, but was also left working for cyber-criminals to exploit the anguish of survivors desperate for information

Public eyes gets smart

Public eyes gets smart

Latest-generation CCTV cameras are bringing intelligent observation to some of the world’s most scrutinised cities. E&T zooms in on the innovations.

Cyber terrorism: the reality

Cyber terrorism: the reality

The future threat that the Stuxnet worm poses is a blueprint for attacks on real-world infrastructure, but what is being done to protect industrial control systems and who cares, asks E&T.

Cyber-terrorism concerns growing

Cyber-terrorism concerns growing

How worried should we be about the likelihood of cyber-terrorist attacks launched through the Internet?

Analysis: US Bill puts 'cyber-war' on legislative agenda

Analysis: US Bill puts 'cyber-war' on legislative agenda

Critics say a controversial bill going through Congress would let the US President 'turn off the Internet' if vital services were threatened.

Preparing for the worst

Preparing for the worst

Cyberwar threats are all too real, E&T investigates.

Social engineering: an intruder's tale

Posing as an IT consultant, Colin Greenless performed a penetration test on a FTSE-listed financial services firm. One or two tricks of social engineering gave him free access to some very useful - and very valuable - information.

Analysis: a unified framework for IT security

The IT security sector must take a more unified approach to establishing industry-wide standards for all aspects of secure systems build and maintenance, argues E&T.

You've been hacked

You've been hacked

Cybercrime is a real and growing problem. As the internet grows, so do the numbers of people ready to able and exploit its vulnerabilities.

Killer spam: the business threat

Ever-escalating spam levels are close to tearing the commercial guts out of any business and organisation that relies on email as a primary method of business communication.

IT security's infamous five

Despite all the warnings, all the headlines, and all the headaches, there are some security basics that we just keep leaving undone: Graham Cluley names them.

Security skills: aptly qualified or merely mollified?

IT security specialists want recognition and acclaim from their managers – but gaining the proper qualifications to endorse their status is not clear-cut.

Hardware that blocks hardcore

Bloxx Tru-View could be on the list of organisations worried about what their staff are downloading from the web.

Hacking the human

Any IT security can be circumvented by hackers who target the human factor - but risk can be minimised

Latest Issue

E&T cover image 1408

"What the Scottish independence referenda could mean for engineers and engineering on both sides of the border"

E&T jobs

E&T Marketplace

The essential source of engineering products and suppliers.

E&T podcast

Tune into our latest podcast

iTunes logo

Subscribe

Choose the way you would like to access the latest news and developments in your field.

Subscribe to E&T