Threats and risks

Security of open source in a post-Heartbleed world

computing-enterprise-security-and-risk-management-summit-panel-discusses-keeping-up-with-the-security-threats-of-today
'We don't have the opportunity to change our minds now, we're using open source, that decision is made,' said Marc Lueck on panel discussion about security
02 Jul 2014

'Buy a big enough botnet and you can crack almost any level of encryption' says BT

datagovernancepanel
'Encryption no longer be all and end all' says head of information assurance Jelleyman
01 Jul 2014

Project to detect collusion attacks on Android begins

collusion
Collusion attacks use malicious apps to circumvent Android controls in order to pass data to criminals
01 Jul 2014

Advanced Persistent Threats 'absolutely exist' says Palo Alto Networks

'This kind of thing is happening all the time now' says systems engineering manager Sherlow
01 Jul 2014

Email isn't secure but it's here to stay, says Websense information security officer

People dislike email but businesses are stuck with it, Neil Thacker tells Computing's Enterprise Security and Risk Management Summit
01 Jul 2014

M&S CISO: I have to remind our board that we are going to have data breaches and get hacked

Matt Denny was launched into a 'here be dragons' type situation
01 Jul 2014

BBC board wary of security projects, says info security manager

'It’s all about reputation, availability and staying on the telly' reveals Cooper
01 Jul 2014

No more castle building - enterprise security and risk management

Research for Enterprise Security & Risk Management Summit 2014 finds IT moving away from a protect-at-all-costs mentality
01 Jul 2014

US ambassador: 'We must stop Chinese cyber crime'

Max Baucus, the United States ambassador to China, says action must be taken to prevent cyber crime originating from the country
25 Jun 2014

Heartbleed - 300,000 systems still not secure

Even a decade from now, critical systems could be vulnerable, claims security researcher
23 Jun 2014

US Congress to cut finance for NSA ‘backdoor snooping’

Representatives assert themselves to bar government agencies from demanding 'back door' access to IT platforms
20 Jun 2014

Amazon launches smartphone with 3D gimmickry and retail sales leanings

That’s all very well… but is it innovation?
19 Jun 2014

GCHQ can now legally track Google, Facebook and web-based email without warrants

Welcome to your connected future, citizen
18 Jun 2014

80 per cent of data centres still using physical security to protect virtualised estate

And only a fifth of those are taking steps to phase it out
18 Jun 2014

If you can’t get business done, tight data centre security is worthless, warns Trend Micro

Think about the application of technology as well as the capability, says VP of cloud
17 Jun 2014

Tweetdeck 'hack': rudimentary, but still widely shared

The XSS vulnerability in Tweetdeck showed just how easily scripts can be run on user devices from a simple security flaw.
12 Jun 2014

Security industry advice for battling Turing Test-beating AIs: 'Be nice and sceptical'

Symantec and Juniper admit there is not yet a clear plan for beating more advanced forms of 'Eugene Goostman'
11 Jun 2014

Google must prevent illegal access to our content, says News Corp

Phone-hacking media giant unhappy about with Google search algorithms that let downloaders 'steal' its TV shows
09 Jun 2014

Call for more specialist code reviewers after new OpenSSL vulnerability found

University of Ulster's Kevin Curran tells Computing that code reviewers need to think like hackers
06 Jun 2014

European governments targeted by 'Molerats' cyber-crime gang

BBC and a major financial institution also attacked with 'spear phishing' emails
03 Jun 2014

National Crime Agency issues warning over GOZeuS and CryptoLocker malware

P2P network that controls banking Trojan taken down in action led by FBI
03 Jun 2014

Flaws in 999-emergency calling system software exposes sensitive calls to hackers

Multiple flaws in NICE Systems software and MySQL database could be exploited by hackers, warns security company
31 May 2014

NHS cyber security 'suffers from lack of data ownership'

Coventry University's Dr Siraj Ahmed Shaikh responds to report Criticising cyber security in healthcare
30 May 2014

Security experts' surprise over report claiming healthcare 'lags behind' in cyber security

Mimecast and Trustwave question claims made in report by risk start-up BitSight
29 May 2014