Special focus: IT security
There are myriad security challenges facing IT professionals today: personal computers that get hacked, viruses hijack machines, and keystroke loggers steal passwords which end up on public web sites. Yet the amount of security-critical transactions conducted on such systems is steadily increasing.
There are also mobile devices such as smartphones and tablet PCs, increasingly being used for critical transactions and projected to replace PCs as the web access device of choice. All these computing devices are in use in modern businesses and their effective management poses a growing challenge to the IT professional.
Selected it-security news
New Zealand’s Prime Minister John Key denied allegations the country had planned mass surveillance operations as revealed in documents leaked by Edward Snowden.
The US government threatened to fine Yahoo $250,000 a day in 2008 if it failed to turn over customer data to intelligence agencies.
Cyber-security researchers have managed to run the classic 90s computer game Doom on an Internet-enabled Canon printer after hacking its web interface.
Card fraud hit a record £174.5m in the first half of this year, new figures show, but criminals are relying on social engineering in the face of better security.
The Internet of Things needs to be built from the bottom up with a ‘security first’ architecture, according to new research.
Apple plans additional security features to keep hackers out of user accounts in the face of the recent celebrity photo scandal.
A free online course designed to inspire the next generation of cyber-security professionals supported by the Government has launched.
Car theft has entered the cyber age with more than one in three vehicles currently stolen in London being taken through sophisticated hacking methods, the Home Office has revealed.
Apple says the theft of intimate photos of celebrities including Oscar-winner Jennifer Lawrence was due to a targeted attack on individual iCloud accounts.
A new international cyber-crime taskforce will be piloted in an attempt to better coordinate the global response to online threats.
A piece of computer code capable of repeatedly guessing a password has been determined as a likely tool used in the high profile cyber-attack that exposed intimate photographs of tens of celebrities.
Poor code quality is exposing more than two-thirds of retail and financial services applications to cyber-attacks similar to the Heartbleed bug, according to new research.
Sony’s PlayStation Network is back online following a cyber-attack that took it down over the weekend.
A new game that will see players attempt to protect a fictitious aerospace company from hackers is part of a search to find the next generation of cyber-security experts.
US healthcare companies have been subjected to a series of cyber-attacks targeting patient data and intellectual property information, the FBI has said.
A cyber-attack that saw hackers steal data on 4.5 million hospital patients is the first known large-scale breach exploiting the ‘Heartbleed’ bug.
Apple has started storing users’ personal data on mainland China for the first time, using servers provided by China Telecom.
A new campaign launched by the National Crime Agency together with the UK government aims to educate users of electronic devices about cyber dangers.
The US National Security Agency is struggling to attract top technology workers after revelations of widespread eavesdropping practices damaged its reputation.
An Android app that actively scans other apps to determine how risky they are has been launched, promising a new level of user safety.
Security researchers at Kaspersky Lab said they have uncovered a massive cyber espionage operation targeting spy agencies and governments in Europe and the Middle East.
A company contracted to perform background checks for the US Department of Homeland Security said it had been a subject of a most likely state-sponsored cyber-attack.
Roughly 1.2 billion Internet logins and passwords have been amassed by a Russian criminals, according to a cyber-security firm.
A Spanish cyber-security researcher said he had figured out how to hack satellite communications systems on commercial jets through their Wi-Fi and inflight entertainment systems.
The recent hacking attempt on a sensitive Canadian government computer network bears resemblance to attacks mounted by an elite unit of the Chinese army, a cyber-security expert has suggested.
The group behind Internet-anonymity software Tor has said many of its users may have been identified by government-funded researchers.
USB technology could be exploited by hackers to load malicious software on computers without triggering security alerts, new research has shown.
Representatives of privately owned German encryption technology developer Secusmart believe the German government won’t find any obstacles for its prospective sale to smartphone maker BlackBerry.
A bill to ban the US government's bulk collection of Americans' telephone records and Internet data has been introduced to Congress.
Companies behind the Israeli Iron Dome missile shield have reportedly been robbed off hundreds of sensitive documents by hackers from China.
Sensitive financial and personal information of Android smartphone users could have been accessed by hackers since 2010 due to a previously unknown vulnerability.
High-level Chinese hackers recently tried to break into a key Canadian computer system, forcing Ottawa to isolate it from the main government network, a senior official said on Tuesday.
Ransomware attacks on Android smartphones, preventing users from accessing their gadget unless they pay the attackers, are expected to rise.
Unsecured automated homes provide an easy access to data about home owners and could be used by burglars seeking access to properties, German researchers have found.
A flaw in an anti-surveillance operating system makes it possible to reveal users’ IP addresses, which are meant to be hidden by the software.
Two MPs will sue the Government over the introduction of the controversial Data Retention and Investigatory Powers Act.
Cyber security researchers have developed a prototype device to prevent hackers from launching attacks on travelling cars.
A talk on how to identify users of the Internet privacy service Tor has been withdrawn from the upcoming Black Hat security conference.
Customers of a surveillance-dodging mobile calling service can now purchase a fixed rate calling plan that allows them to make encrypted calls across 79 countries, according to the firm.
A cyber-security firm that claims to have uncovered a state-sponsored hacking group is merely seeking publicity according to China.
The US government has warned critical infrastructure operators to make sure their systems haven’t been infected with malicious software from a hacking group known as Energetic Bear.
Finland’s government has been subject to a series of ongoing cyber-attacks launched by a foreign government , Finnish officials have revealed.
At least 20 cases have been dropped by the National Crime Agency in six months as a result of missing communications data, according to the Home Secretary.
Cyber-theft of trade secrets by China is a threat to US national security, America’s new Ambassador to China Max Baucus said today.
A password alternative that uses a sequence of memorable faces as a key may have cracked the traditional trade-off between memorability and security.
More than four in ten organisations obstruct access to people’s personal data in contravention of European law, a new study has found.
GCHQ has announced it will start to share classified cyber-threat information with private companies being targeted by increasingly sophisticated hackers.
The window for computer users to protect themselves from the GOZeuS and CryptoLocker malware closes at midnight tonight.
Malware dubbed one of the "most advanced global cyber-espionage operations to date” is using old-school virus techniques, according to new research.
Internet users can now check whether or not cyber criminals have stolen any of their personal data and released it online, courtesy of the Identity Leak Checker, a free online service.
The cost of cyber-crime is so high that if it were a nation it would be ranked 27th in the world based on revenue, according to a new report.
A new cutting-edge cyber-security centre inaugurated in Italy will boost Europe’s cyber defence by scouring the dark internet using one of the most powerful supercomputers in the world.
Vodafone has disclosed that government agencies in a small number of countries in which it operates have direct access to its network, enabling them to listen in to calls.
A new cyber-security certification scheme has been launched to help organisations defend themselves against Internet-borne threats.
The volume of encrypted email is rising rapidly, according to new data, as providers try to shield their users from government spies and other snoopers.
Regular charging of electric vehicles leaves a data trail which could be exploited by malicious agents, German researchers have said.
An international operation to take down infrastructure behind two malware families will give computer users a “two-week window” to protect themselves.
Nato has run the largest international cyber manoeuvre in the history, underlining the growing importance of cyber warfare in modern-day security.
Hackers are more technologically advanced than those trying to stop them, according to a survey of 500 US business executives, law enforcement services and government agencies.
People with iPhones in the UK and Australia have been targeted by hackers who lock their device and demand money to release it.
Computers of China's government won't be allowed to run Microsoft's Windows 8 operating system, China said, while announcing widespread investigations of IT suppliers to protect national security.
Hackers stole some 145 million user records from eBay servers in what is poised to go down as one of the biggest data breaches in history.
eBay is asking users to change their passwords after a cyber attack that compromised a database containing encrypted passwords.
China has summoned the USA’s ambassador after the US accused five Chinese military officers of hacking into American companies to steal trade secrets.
US defence giant Lockheed Martin said the number of attacks on its computer systems has quadrupled since 2007.
Samsung’s KNOX system designed for public sector services dealing with sensitive data is secure enough to handle classified information, the UK government has said.
The eight most common IT vulnerabilities that have resulted in data breaches have been revealed by the Information Commissioner’s Office.
Microsoft has rolled out an urgent update to fix a Windows XP Internet Explorer vulnerability despite having discontinued support for the system this month as hundreds of millions of users haven’t upgraded yet.
Chemring has developed a network security system mimicking the fight-or-flight fear response of mammals.
Spending using contactless "tap and go" card payments has topped £100 million in a single month for the first time, industry figures revealed.
Anti-malware researches have managed to exploit the Heartbleed vulnerability to access protected forums used by hackers to exchange information.
Google has admitted that incoming and outgoing emails are automatically analysed by software to create targeted ads.
Computers of the German Aerospace Centre (DLR) in Cologne have been under an ongoing several month long cyber-attack.
Firewalls, email systems and even mobile phones could be at risk from the Heartbleed bug, according to cyber security experts.
Hacking groups have been detected running automated scans of the Internet in search of Web servers vulnerable to the ‘Heartbleed’ bug.
The UK government has paid more than £5m to Microsoft to extend Windows XP system support for governmental services.
Most of the world’s prominent news organisations have been attacked by hackers secretly working for various governments, a study by Google security engineers has revealed.
The UK needs to completely overhaul its voting system introducing new technologies including e-voting to help the public engage with politics, said Electoral Commission Chair Jenny Watson.
The US National Security Agency (NSA) has infiltrated servers of Chinese telecommunications company Huawei, obtaining sensitive information and monitoring the communications of top executives.
An international team of researchers has exposed holes in the WPA 2 protocol that has so far been considered the safest system to secure wireless computer networks.
Japan has run a large-scale cyber-security exercise, simulating a massive attack on its government departments to spot weaknesses prior to the 2020 Olympics.
Nato has been fighting against a string of cyber-attacks over the weekend as hackers disabled several of the organisation’s websites, probably in connection with the Crimea situation.
A 19-year-old student has been crowned as the UK’s Cyber Security Champion after a gruelling two-day national cyber attack simulation.
With thousands of ATM’s in the UK still running on the outdated Windows XP software, British banks are now queuing up at Microsoft to negotiate deals for the company to extend support.
The US National Security Agency has denied allegations it has been infecting millions of computers with malware.
The US National Security Agency has been hijacking botnets as a resource for spying, according to a leaked slide by Edward Snowden.
Ukraine’s telecommunications system had been subject to a string of cyber-attacks most likely from Russia, Ukraine’s security agency said.
A highly resilient cyber espionage toolkit known as ‘Snake’ has been unmasked by defence contractor BAE Systems.
Britain is wasting time asking China to stop cyber attacks, former UN commander and Tory MP Bob Stewart has said.
Software that encrypts manufacturing data so as to prevent piracy and data theft will be revealed at a trade show next week.
IT geeks in army reserves could be the solution for the UK to defend the country against growing cyber-threats, a Conservative MP said today.
Labour wants new powers that allow security services to crack down on cyber-crimes, but only with extra checks on how sensitive data is used.
Japan’s vice finance minister Jiro Aichi has said the bitcoin virtual currency should be regulated on an international level to avoid loopholes and debacles such as this week's closure of a major Bitcoin exchange.
UK spy agency GCHQ has been accused of intercepting and storing webcam images of millions of Yahoo users.
Hackers have joined protests against the football World Cup to be held in Brazil by threatening to attack the event through jamming websites and data theft.
A virus that spreads through Wi-Fi networks as efficiently as a cold spreads between humans has been demonstrated by researchers.
Data available from mainstream online media could be used to mount a cyber-attack on UK critical national infrastructure.
French aerospace company Snecma has been attacked by hackers through an Internet Explorer security gap.
Bitcoin has been attacked by unknown hackers sending "mutated" lines of code into the program that runs the virtual currency.
The first cyber espionage campaign believed to be started by a Spanish-speaking country has been uncovered by a security software firm.
BAE Systems plans to recruit more graduates to its cyber and security unit than any other part of its UK business in 2014.
Usernames and passwords of some of Yahoo's e-mail customers have been stolen and used to gather personal information about people they have recently corresponded with.
American and British intelligence agencies have devised ways to gather data from smartphone applications such as Angry Birds to spy on Internet users, the New York Times has revealed.
Online trust has fallen to its lowest point in three years, with only 55 per cent of British internet users saying they trust companies with their personal data, a survey has revealed.
Data available from mainstream online media – such as blogs, social networking websites, and specialist online publications – could be used by malevolent agents to mount a cyber-attack on UK critical national infrastructure (CNI), the findings of an investigative assessment to be presented next week will warn.
Hackers broke into a computer of Israeli defence ministry using an email attachment containing malicious software pretending it had been sent by the country’s Shin Bet security service.
The NSA's mass phone-call data-gathering programme provided only negligible effects to fight terrorism and should end, the US Privacy and Civil Liberties Oversight Board has concluded.
The number sequence '123456' has topped a list of the 25 most commonly used passwords.
A temporary glitch in China’s Great Firewall has redirected millions of Chinese Internet users to an anti-censorship website meant to be blocked by the system.
Network operator EE is working on an emergency security upgrade after a researchers discovered a security flaw in its routers.
The US National Security Agency has implanted secret surveillance software in nearly 100,000 computers around the world to gain access to spy-proof machines.
Flamboyant millionaire John McAfee has welcomed news that Intel has dropped his name of from its security products.
The US National Security Agency is trying to develop a computer that could ultimately break most encryption programs, according to reports.
A hacker collective that supports Syrian President Bashar al-Assad, has claimed credit for hacking Skype's social media accounts.
Computer kidnapping, hacking of cars, medical devices or watches, state-sponsored attacks and Obamacare website breaches have been named among the most likely cyber-crimes of 2014.
A White House-appointed panel has proposed curbs on some key National Security Agency surveillance operations.
Top technology company executives have pressed US President Barack Obama to rein in his government's electronic spying.
A judge has ruled that the US National Security Agency's gathering of Americans' phone records is likely unlawful.
Oversight of Chinese telecoms giant Huawei will be increased amid fears its equipment could be used for cyber espionage.
Google is asking the High Court to block a breach of privacy legal action launched against it by a group of British Internet users.
A new institute investigating cyber-threats to vital systems that control the UK’s industry and infrastructure has been launched.
Almost two thirds of all website traffic is now generated by bots, nearly a third of which are malicious, according to new research.
Detectives have arrested four people over a £1m cyber-theft from two banks using computer viruses embedded in emails.
Chinese hackers broke into computer systems of five European foreign ministries last September by sending an email containing infected files that loaded malicious codes on the victims’ computers.
The world’s top technology companies are urging the USA and other governments to reform their online surveillance practices.
The US National Security Agency (NSA) and British GSHQ have spied on the international online gaming community, documents leaked by whistle blower Edward Snowden have revealed.
Microsoft has disrupted a botnet nearly two million computers strong that costs online advertisers upwards of $2.7m a month.
New arms sale regulations urgently need to be introduced to clamp down on the export of electronic surveillance technology.
Obamacare website puts sensitive data of users at risk, experts have said said, recommending it to be shut down until the problems are addressed.
Yahoo! has pledged to encrypt all user information moving between its data centres by the end of the first quarter of next year.
A fake cyber-attack conducted by a foreign government and a denial-of-service attack disabling users’ networks were among scenarios tested during the Waking Shark II operation.
Credit card details of some 500,000 European users might be at risk as a marketing firm running award schemes for companies across Europe admitted being a victim of a major hacking attack.
Financial companies in the UK’s capital will be put through a war game scenario next week to test how well they can handle an extensive cyber-attack.
The outing of a secretive Chinese military hacking unit has failed to halt cyber attacks from the country.
A new anonymous Internet marketplace for illegal goods has been opened, featuring the same name and design as the Silk Road but offering better tools to protect users’ anonymity.
Microsoft has released an emergency fix after having learned hackers were exploiting a previously unknown security flaw to attack the popular Office software.
Britain is sleepwalking into becoming a surveillance state as the capacity to collect and analyse data grows MPs were told.
The security of the US health insurance website has been put at risk due to a lack of testing before the rushed launch in early October.
A programming code that makes emails shut down when they are at risk of being intercepted will be released to the public to improve communication security.
Hackers can intercept data transmitted between contactless cards and payment terminals using easily available and portable electronic devices, a study of Surrey University researchers has found.
A 28-year-old hacker from Suffolk, UK, has been arrested by US authorities for penetrating thousands of US military computer systems, aiming to steal confidential data.
Germany’s major telecoms provider is negotiating with other telecoms companies to join forces to protect local Internet from foreign influences.
A new fingerprint scanning biometric authentication system that developers say could eradicate cybercrime has been unveiled.
The US National Institute of Standards and Technology (NIST) has put forward a draft of voluntary standards to help critical industries prevent cyber-attacks.
The US National Security Agency collects hundreds of millions of contact lists from personal email and instant messaging accounts.
New security guidance for public sector IT professionals on how to safely deploy the latest mobile devices has been released.
Websites use hidden scripts to extract device fingerprints from users’ browsers without the users’ consent, a Belgian study has found.
In the wake of the recent hacking attack on Adobe Systems, cyber-security experts have highlighted how companies having an incident response plan in place is as important as preparation against such attacks.
The head of the new National Crime Agency has warned criminals using the “deep web” they cannot hide from police.
Adobe Systems says hackers have stolen source code to some of its most popular software and data about millions of its customers.
Britain has been asked by Belgium to respond to claims GCHQ hacked in the IT network of Belgian telecoms provider Belgacom.
UK Defence Secretary Philip Hammond has appealed to Britain's top IT experts to join the newly established Joint Cyber Reserve Unit to help protect the UK's computer networks from cyber-attacks.
Intelligence chiefs say they are open to measures to increase oversight of the US government’s electronic eavesdropping programs.
Microsoft has released an emergency software fix for Internet Explorer after hackers exploited a security flaw in the browser to attack an unknown number of users.
A quarter of UK manufacturing companies are putting their IT systems at risk by allowing employees to use their own personal devices at work but not having a formal bring-your-own-device (BYOD) policy in place, according to research carried out by cloud computing specialist Intrinsic Technology.
The USA’s National Security Agency has secretly developed the ability to crack or circumvent commonplace Internet encryption.
A breakthrough in quantum cryptography could allow large scale communication networks using the technology to be developed.
More than half of senior IT security professionals believe the industry is losing the battle against state-sponsored attacks.
The Syrian Electronic Army (SAE) has broken into systems of an Australian Internet company managing addresses of some of the world’s most prominent news websites.
A German government technology agency has warned that new security technology in computers running Microsoft's Windows 8 operating system may actually make PCs more vulnerable to cyber threats.
Researchers from the Royal Holloway University have developed a prototype app that can help protect users against phishing attacks.
The USA’s National Security Agency broke privacy rules or overstepped its authority thousands of times each year since 2008.
Hackers from the Syrian Electronic Army have simultaneously targeted several news sites by breaching a single supplier.
Germany’s government wants to foster Europe’s technology companies to make them stronger competitors to their US counterparts.
GCHQ has launched two cyber incident response initiatives to help UK businesses who suffer cyber-attacks.
The UK is losing the war against Internet crime, an influential group of MPs has warned.
Talks between China and the US on cyber security have gone well, Chinese state media said today.
China says it is ready to discuss strengthening cyber security at a top-level forum with US officials next week.
The Ministry of Defence has announced a new partnership with its major contractors to bolster the UK’s resistance to cyber warfare.
Computer experts looking to join the military reserve force to help fight cyber terrorism will be allowed to avoid tough fitness testing, Defence Secretary Philip Hammond said today.
The energy sector in the Middle East is extremely prone to cyber-attacks, said DNV KEMA, world’s leading energy consultancy.
China's Huawei Technologies should not have been permitted to become embedded in Britain's critical network infrastructure without the knowledge and scrutiny of ministers, UK’s lawmakers said on Thursday.
China's top Internet security official says he has "mountains of data" pointing to extensive US hacking aimed at China.
Chinese hackers have allegedly stolen designs for dozens of US weapons systems and blueprints for Australia's new spy HQ.
Two new centres of excellence funded by the Government will train the next generation of cyber security experts.
China has dismissed the US’s “groundless accusations” of using cyber-espionage to acquire military technology.
A lack of information security skills among the UK’s IT workforce is hampering the fight against cyber criminals, according to the latest research from the IET.
The number of cyber-attacks hitting businesses has soared in the past year, Government-commissioned research revealed today.
Oracle has released a major security update for the version of Java programming language that runs inside Web browsers.
InfoSec Skills will launch competitions testing IT security skills of business leaders as part of the Cyber Security Challenge.
Companies experience cyber attacks up to once every three minutes, a report says.
Cyber-security experts yesterday demonstrated how the latest zero-day vulnerabilities in Java could be used in a cyber-attack.
Hackers have apparently broken into at least two of North Korea's government-run online sites.
Cyber security experts from industry are to operate alongside the intelligence agencies for the first time.
Faculty members at a top Chinese university have collaborated for years with an army unit accused of hacking Western targets.
This week's cyber-attack on South Korean broadcasters and banks may not have originated in China.
A hacking attack on three South Korean broadcasters and two major banks has been identified by most commentators as North Korea.
Several official BBC Twitter accounts were hacked today by what appeared to be pro-Syrian government hackers.
Computer networks at two major South Korean banks and three top TV broadcasters went into mass shutdown today.
North Korea has blamed South Korea and the United States for cyber attacks that temporarily shut down websites.
Cyber experts said it was important to recruit a broad range of people after a chemist won a cyber security competition.
Cyber-attacks and cyber espionage have supplanted terrorism as the top threats to the United States, says a new report.
Researchers at the Fraunhofer Institute for Secure IT have developed security software to enable the use of Android smartphones for access control.
Security firm Secusmart has developed a crypto plug-in for the Blackberry 10 smartphone which, it claims, turns it into the first widely-available smartphone to meet government-level Classified security levels.
Orange and security firm Morpho have announced a mobile identity management system specifically designed for the healthcare sector.
Vodafone has teamed up with defence firm BAE Systems to develop new technology to protect businesses against cyber-attacks.
The Ministry of Defence is to recruit a new force of "cyber reservists" to bolster the uK's online defences.
IT specialists should consider becoming police volunteers to help stop cyber criminals, the Security Minister is to suggest.
Chinese telecoms equipment manufacturer Huawei is working with one of its toughest critics to reduce its hacking vulnerabilities
William Hague will warn a conference in Budapest that cybercrime is one of the greatest challenges facing the world.
Cyber security experts across Europe are taking part in the EU's biggest cyber security exercise.
GCHQ has unveiled an online security competition to identify future espionage recruits and raise awareness of cyber attacks.
Microsoft has warned a newly discovered bug in its Internet Explorer web browser makes PCs vulnerable to attack by hackers.
Finalists of the Cyber Security Challenge UK competition have visited GCHQ to find out more about cyber security.
The inventor of the World Wide Web has denied there is an 'off' switch that could turn off the Internet across the globe.
A second suspected member of LulzSec was arrested on charges he took part in a computer breach of Sony Pictures Entertainment.
A cyber espionage campaign targeting Iran and other parts of the Middle East has widened, according to security experts.
Intel security experts are working on finding ways to protect automobiles from electronic bugs and computer viruses.
Gaming company Blizzard has confirmed that hackers have stolen some account details of its users.
South Korean police have arrested two computer programmers on suspicion of hacking personal data of 8.7 million KT subscribers.
A cyber espionage campaign targeting Iran and other Middle Eastern countries has been uncovered by security experts.
Up to 300,000 computer users around the world are at risk of losing internet access due to a computer virus.
The Ministry of Defence has extended its cyber security agreement with BT as it defends its networks against increasing threats.
LulzSec hackers have admitted they were behind cyber attacks against the CIA, the NHS and the Serious Organised Crime Agency.
Internet service providers will start warning their customers who illegally download files as Ofcom cracks down on online piracy.
LinkedIn says it is working with the FBI after the theft of around 6.5 million member passwords.
Digital risk management and investigations consultancy Stroz Friedberg has cautioned UK law firms that their failure to tackle online security will leave clients vulnerable to hackers.
Social networking site LinkedIn has warned millions of users to reset their passwords after security information was stolen.
Governments need to work together to stop cyber-attacks and operating systems must be redesigned, Eugene Kaspersky, the founder of Kaspersky Lab says.
The BBC’s boss says the company suffered a ‘sophisticated cyber-attack’ after an attempt by Iran to undermine its Persian Service.
NASA has said that hackers gained access to mission-critical projects in 13 major network breaches last year.
Network security company GFI Software released its VIPRE report showcasing the ten prevalent threat detections encountered by its GFI VIPRE Antivirus users in January 2012. The malware attacks target a range of victims including gamers, small businesses and government organisations.
Anti-virus company Avast has revealed hackers are now targeting children’s gaming websites to spread malware and hack into the home network.
Mozilla’s reported plan to implement ‘silent’ background updates in the upcoming version of Firefox 10 has been questioned by security company Lieberman Software.
IT security firm Sophos has revealed the top twelve countries responsible for spam messages from its Q3 2011 report, the ‘Dirty Dozen'.
The death of Libyan dictator Muammar Gaddafi is driving huge public interest in viewing photos and videos of his last moments - and providing cybercriminals with an opportunity to ensnare the morbidly curious surfers.
Spammers will take advantage of Twitter’s enablement of user targeting by UK brands, warns information security firm Sophos.
Brooklands College will be using IT security firm Sophos for its two-site network in Surrey and Kent against an increase in viruses and malware threats.
Seventeen per cent of UK employees consider accessing social networks from the workplace ‘a major risk’ to enterprise security – and many are calling for clearer guidelines on social media usage on behalf of their employers.
Hackers spied on about 300,000 internet users in Iran last month after stealing security certificates from a Dutch IT firm.
WikiLeaks has been the target of a cyber attack as it released thousands of previously unpublished U.S. diplomatic cables.
Increased pressure to improve the speed and security of file transfers from customers and partners is creating vulnerabilities in enterprise security procedure.
The Cyber Security Challenge UK has launched a competition challenging participants to detect hacker activity on Linux systems.
Hackers at the Defcon convention managed to trick employees at some of the largest U.S. companies to help them steal data.
China's top paper has dismissed as "irresponsible" suggestions that the country is linked to large-scale internet hacking.
Smartphones are overtaking laptops as the mobile device of choice for enterprise workforces, bringing another headache for IT departments to contend with.
Business software company SAP says it will release a patch to customers to fix a security flaw in its software.
More than 30 North Korean hackers were hired by a South Korean crime ring to steal personal data from South Korean gamers.
McAfee has uncovered the biggest series of cyber attacks to date, involving 72 organisations targeted including the UN.
A teenager believed to be a leading member of the Anonymous and LulzSec hacking groups has been released on bail.
Un-patched and often pirated versions of Windows XP are a main target for rootkits infections, according to the AVAST Virus Lab.
It should be much easier for blind and visually impaired mobile users to tell who is calling them if a system being showcased at this month’s Mobile World Congress in Barcelona takes off.
Network security companies must innovate or die
Governance is playing an increasingly important part of information security within enterprises.
The spot market in European Union emissions permits may re-open next week following a cyber attack that resulted in nearly 30 million euros (£26 million) of carbon permits being stolen.
Chief information officers must ‘re-imagine’ IT to support growth and competitive advantage, say findings from the ‘2011 CIO Agenda’ survey.
Half a million required to keep up with projected UK demand over the next five years, says e-Skills survey.
The value of the enterprise network and data security market is set to exceed $10bn by 2016.
Registration for the SANS London 2010 event shows an 11 per cent increase of women students for Security 560, ‘Penetration Testing and Ethical Hacking’ providing further evidence that more women are breaking into the sector, and may now account for 17 per cent of IT security practitioners.
What’s been launched as the UK’s ‘first hunt for future cyber security professionals’ has begun.
Up to 35 per cent of organisations suspect that their most sensitive internal information has been illicitly passed over to competitors – most probably by former employees.
Google is urging its employees to dump Microsoft Windows in favour of Mac OS and Linux citing security concerns, say reports.
Twenty-five per cent of IT administrators have voted ‘Securing remote access’ as the issue that most keeps them a peaceful night’s sleep, while 15 per cent said ‘keeping virus definitions up to date’ was their second biggest nocturnal concern.
The Information Security Forum (ISF) has launched a series of initiatives designed to lead toward a industry standard for managing information security requirements for enterprise third-party relationships.
Kaspersky Lab is considering developing its new PURE home security software to become an operating platform for which approved third parties will be able to develop updates and plug-ins.
Social media and Cloud Computing have increased the vulnerability of UK companies and public sector organisations to new cyber threats, with hacking and denial of service attacks having doubled since 2008.
More than half of information security professionals received salary increases in 2009, according to the surveyed for the (ISC)2 2010 Career Impact Survey, while less than five per cent of participants lost their jobs.
The art of war, and the art of information security, are closely aligned, claims a new book ‘Assessing Information Security: Strategies, Tactics, Logic and Framework’ that applies the principles of Sun Tzu’s classic text to online threat combat.
South Africa’s hosting of the 2010 Soccer World Cup will make it the target of an intense cybercrime wave in the lead-up to the FIFA tournament in June, security experts have warned.
Kaspersky Lab CEO Eugene Kaspersky has called for more global regulation in the fight against online threats. Speaking to E&T at InfoSecurity Europe 2009, Kaspersky said that the era of the unregulated Internet has passed, and that the notion of unregulated public networks was not realistic when economies could be wrecked by cyber-criminals.
The Internet firewall is 'dead', according to IT security start-up Palo Alto Networks. Speaking live on the third of E&T's exclusive video bulletins from Infosecurity Europe 2009, director of corporate marketing Franklyn Jones says that with enterprises increasing their use of online applications, the traditional concept of a protective traffic gateway needs reinvention.
Cyber-criminals are continuing to show increasing interest in targeting the Apple Mac community and users can expect a slew of new Mac-specific malware and Trojans, Sophos senior technology consultant Graham Cluley has warned, speaking exclusively in the fourth of E&T magazine's video bulletins from InfoSecurity Europe.
A network of 1.9m malware-infected computers has been identified by web gateway vendor Finjan’s Malicious Code Research Center (MCRC). Corporate, government, and consumer computers around the world were infected by the malware, the company claims.
Companies are leaving themselves vulnerable to employees’ ‘purposeful flouting’ of the rules when it comes to information security, claims a survey by certification company (ISC)2.
Over 30 per cent of human resources departments and business managers admit to searching for potential and current employees’ social networking profiles for information about their background and behaviour - and 24 per cent of those say that they have been put off by something they have found.
Ninety per cent of IT managers in the educational sector view anonymous proxies to be a problem, compared with 51 per cent in the private sector. Anonymous proxies are the most popular way to bypass an organisation’s Internet filtering: thus connected, users can surf any website unmonitored, even if it should have been blocked by a Web filter.
‘Application security’ tops a global list of most commonly-searched-for IT security terms according to an analysis of current Google search trends and volume statistics by risk management firm ArmstrongAdams. Data loss and PCI DSS ranked highest in terms of UK originated searches in December 2008.
Selected it-security features
How many cyber-security researchers does it take to hack a light bulb? About six, according to one firm, which has demonstrated that the manufacturers of the growing number of connected devices in our homes appear to have a security blind spot.
Nothing is safe on the Internet, including your home router. That may already have been hacked – but if the world becomes as connected as companies are hoping, that could be the least of your worries.
The continuing furore over the Heartbleed bug holds important lessons for the IT industry, both about the way it responds to major incidents and also the way software is produced.
From humble beginnings the World Wide Web has become the backbone of modern civilisation, but the inability of its creators to foresee its meteoric rise has resulted in shaky foundations.
Security has become an even more major concern for the makers of processors and software for embedded systems in the rush to connect them to wireless network – and even the wider Internet. It is driving a rethink in the way devices are designed to prevent network-based attacks and attempts to reverse-engineer the firmware inside.
The healthcare industry is under attack, with imposters, fraudsters and cyber-criminals pretending to be people they are not to acquire personal patient data. But the ID theft clampdown has begun.
As the world becomes ever more digitised, the uneasy relationship between personal privacy and national security grows increasingly complex.
Just who are you inviting into your home with that latest 'smart' technology purchase?
With more and more people living out large parts of their lives online, cybercriminals are finding endless new ways of stealing identities.
The media has been full of reports of cyber-attacks on critical infrastructure, but the fear is that there is far worse to come.
Why should hackers try to disable computers when they might be able to set their sights higher? Routers can be just as vulnerable as servers, so why not bring down the entire Internet?
While governments state that cyber security is now one of their top national challenges, the overall cost-impact cyber security is incurring – both in terms of necessary investment and damaging outcomes following an attack – is far from clear.
Firewalls should still be an integral part of any enterprise's cyber security strategy, and vendors of the hardware variety are redoubling their R&D to win more market share.
Small businesses need to upgrade their awareness of - and abilities in - cyber security if they are to avoid becoming the 'soft underbelly' of the UK's fights against hackers and cyber threats.
As point-of-sale systems embrace mainstream software, they will have to deal with the security threats that come with it. After all, what cybercriminal wouldn't go after Windows-based devices handling credit and debit cards?
More and more organisations are being targeted in cyber-attacks, and they must get to know their enemy if they are to protect vital networks. Meet the professional, ethical hacker.
We are moving toward a world where every connected system is becoming safety critical - so ICT professionals should step up to the principles of ultra-rigorous system design and build.
'Grey hat' apps are a new phenomenon in software that enable street hackers to delve into your smartphone and access your data, and more besides.
A fake hack attack can be as damaging as a real one and they're becoming increasingly common.
How has Google's Android smartphone operating system managed to become so successful?
Proposed amendments to the EU data privacy laws propose to swap-out carrots for sticks in a redoubled effort to get European organisations to do a better job to protect everyones' data.
Global militant organisations are tapping into the vulnerabilities in mobile technologies for propaganda and recruitment, as well as to filch data for financial gain.
Channelling voice calls over IP networks has brought many advantages to enterprise communications, but it also creates some security risks.
IT is one of the most rigorously regulated parts of an organisation, and legislation affecting information security is spearheading the legal changes.
With users accessing systems from ever more obscure points of entry, how do you keep control of access privileges? We look at the software that may have the answer.
Despite high-profile attacks, there is still a lack of IT security in key public infrastructure. We ask if it will take a major meltdown to prompt governments to take action.
PC operating systems are full of security holes, which is why some are now turning to software first developed for 'hidden' computers to better protect them
Data breaches like the one that affected Sony aren’t the end of the world if companies are honest with customers who have been affected.
Japan's Internet infrastructure withstood quake and tsunami, but was also left working for cyber-criminals to exploit the anguish of survivors desperate for information
Latest-generation CCTV cameras are bringing intelligent observation to some of the world’s most scrutinised cities. E&T zooms in on the innovations.
The future threat that the Stuxnet worm poses is a blueprint for attacks on real-world infrastructure, but what is being done to protect industrial control systems and who cares, asks E&T.
How worried should we be about the likelihood of cyber-terrorist attacks launched through the Internet?
Critics say a controversial bill going through Congress would let the US President 'turn off the Internet' if vital services were threatened.
Cyberwar threats are all too real, E&T investigates.
Posing as an IT consultant, Colin Greenless performed a penetration test on a FTSE-listed financial services firm. One or two tricks of social engineering gave him free access to some very useful - and very valuable - information.
The IT security sector must take a more unified approach to establishing industry-wide standards for all aspects of secure systems build and maintenance, argues E&T.
Cybercrime is a real and growing problem. As the internet grows, so do the numbers of people ready to able and exploit its vulnerabilities.
Ever-escalating spam levels are close to tearing the commercial guts out of any business and organisation that relies on email as a primary method of business communication.
Despite all the warnings, all the headlines, and all the headaches, there are some security basics that we just keep leaving undone: Graham Cluley names them.
IT security specialists want recognition and acclaim from their managers – but gaining the proper qualifications to endorse their status is not clear-cut.
Bloxx Tru-View could be on the list of organisations worried about what their staff are downloading from the web.
Any IT security can be circumvented by hackers who target the human factor - but risk can be minimised
"What the Scottish independence referenda could mean for engineers and engineering on both sides of the border"
- What to Specialise in Electronics Engineering?? [03:02 am 03/04/14]
- Britain to have just one remaining coal pit by the end of 2015 [01:11 am 03/04/14]
- LV Generator Star point earthing - UK [08:35 pm 02/04/14]
- East West Rail - the Oxford to Bedford route [07:33 pm 02/04/14]
- Small nuclear power [06:06 pm 02/04/14]
The essential source of engineering products and suppliers.
Tune into our latest podcast