Security

Protest over mass surveillance begin at GCHQ today

GCHQ Cheltenham
Three-day protest by supporters of civil liberties groups opposing GCHQ's surveillance powers
29 Aug 2014

Insurers to demand more data via telematics to fine-tune insurance prices, says AXA CIO

house-life-buoy
AXA CIO Kevin Murray reveals how telematics devices, in-car and in-home, will increasingly help to set insurance premiums
29 Aug 2014

Former US government cyber security chief used Tor to trawl for paedophile images

WWW in Prison
FBI put malware onto websites only accessible on Tor to identify and track criminals using Tor
28 Aug 2014

FBI probes Russian government links to JPMorgan cyber attacks

State-sponsored response to political situation being 'investigated' by FBI
28 Aug 2014

'Sony doesn't understand security': Why PlayStation Network is such an attractive target for hackers

Sony’s poor reputation for security and the prestige of taking down a gaming giant attracts hackers
27 Aug 2014

Gmail can be hacked with 92 per cent success rate, says University of California

Hotels.com, Amazon, Chasebank apps all also at high risk according to research
26 Aug 2014

Backbytes: Whatever you’re doing, it’s probably against the law

Met Police make laws up as they go along
26 Aug 2014

Ministry of Justice fined £180,000 after prison didn’t realise encryption had to be turned on

MoJ ineptitude 'beggars belief', says ICO, after it is fined again for mishandling prisoner data
26 Aug 2014

NSA built 'Google-like' search tool to mine data from 850 billion communications records

Latest Snowden leak reveals how ICREACH is used to give US intelligence agencies access to communications data
26 Aug 2014

Sony's PlayStation Network hit by DDoS attack

No evidence of personal information being accessed or any intrusion into the network, claims Sony
26 Aug 2014

GCHQ and NSA security staff tip-off Tor developers over bugs

NSA and GCHQ staff are routinely tipping off Tor over bugs the security agencies are trying to exploit
22 Aug 2014

Using mobile and big data to accommodate customer needs – an interview with Hotels.com CTO Thierry Bedos

Hotels.com CTO Thierry Bedos tells Danny Palmer how harnessing mobile and big data technology is allowing the hotel booking service to cater to the personal preferences of customers
22 Aug 2014

Car maker Tesla seeks 30 full-time hackers to break into its cars

Best job ever? Crack a Tesla Model S and it could be yours
21 Aug 2014

US Nuclear Regulatory Commission hacked three times

Spearphishing and malware used by 'foreign' attackers in presumed attempts to steal nuclear secrets
20 Aug 2014

GCHQ port scans 32 countries to find servers it can hack and use in attacks

GCHQ's 'Hacienda' programme to find insecure servers it can compromise - and from which it can conduct attacks
19 Aug 2014

Hacking back - tempting, but is it legal?

Sarah Pearce and Jane Elphick of law firm Edwards Wildman Palmer LLP discuss whether firms should explore hacking back, to stop and deter cyber attackers
18 Aug 2014

Tesco Hudl and other Android devices contain ‘factory reset’ data retention flaw

Firmware error is to blame, say security experts
18 Aug 2014

The internet runs out of memory, and the unhackable is hacked: Top 10 IT news stories of the week

On the flipside, the NHS is grabbing some excellent IT budget-saving opportunities as NPfIT is laid to rest
15 Aug 2014

One-fifth of work PCs harbour malware – study

Malware-infested PCs down to company policies, claims security software company
14 Aug 2014

US construction company sues bank over cyber-heist

TEC Industrial sues TriSummit Bank after cyberheist perpetrated by gang based in Eastern Europe
14 Aug 2014

IT defenders still focused on same old foes

Despite the proliferation of mobile, social media and cloud, companies see the main threats as coming from weak passwords and insider theft
13 Aug 2014

Backbytes: Unhackable Blackphone, err, hacked

$829 'secure' smartphone rooted in five-minutes flat at DefCon security conference
12 Aug 2014

Oracle database 'redaction feature' easily un-redacted, claims researcher

No fancy exploit code required, just a good working knowledge of SQL, claims David Litchfield at Defcon 22
11 Aug 2014

Attacks on government systems in Eastern Europe, Middle East and Central Asia linked to Russian state

Flaws in Windows Server 2003 and Adobe Acrobat Reader opened doors to "Epic Turla" cyber-attackers
11 Aug 2014