Threats and risks

Gmail can be hacked with 92 per cent success rate, says University of California

gmailhack
Hotels.com, Amazon, Chasebank apps all also at high risk according to research
26 Aug 2014

Car maker Tesla seeks 30 full-time hackers to break into its cars

rs2019-tesla2
Best job ever? Crack a Tesla Model S and it could be yours
21 Aug 2014

Tesco Hudl and other Android devices contain ‘factory reset’ data retention flaw

tesco-hudl-screen
Firmware error is to blame, say security experts
18 Aug 2014

The internet runs out of memory, and the unhackable is hacked: Top 10 IT news stories of the week

On the flipside, the NHS is grabbing some excellent IT budget-saving opportunities as NPfIT is laid to rest
15 Aug 2014

IT defenders still focused on same old foes

Despite the proliferation of mobile, social media and cloud, companies see the main threats as coming from weak passwords and insider theft
13 Aug 2014

Theft, breaches and ICO warnings: Top 10 IT news stories of the week

CIOs should be watching their backs after a particularly cybercrime-riddled seven days in IT
08 Aug 2014

Target predicts staggering $148m loss over December security breach

US retailer to pay steep price after 40 million credit and debit card details were stolen in December 2013
07 Aug 2014

US Homeland Security contractor victim of 'state-sponsored' cyber attack

Information about government employees may have been stolen by hackers
07 Aug 2014

'Russian cyber gang' steals 4.5 billion usernames and passwords

'CyberVor' group holds at least 1.5 billion unique credentials in total says Hold Security
06 Aug 2014

All 500,000 Cryptolocker victims can recover files for free

FireEye and Fox-IT team up to offer 'master decryption key' but not all files will be able to be decrypted
06 Aug 2014

‘Irresponsible and senseless’ Paddy Power says 650,000 users’ details were stolen in 2010

Online gambling firm waited four years to tell customers because it hadn't 'detected any suspicious activity' on customers' accounts
01 Aug 2014

Cyber espionage by Google Glass is the next major threat to enterprise security

Some organisations are already jumping onto the wearable technology bandwagon, but are they opening up a new way in for cyber criminals? Danny Palmer investigates.
23 Jul 2014

UK critical business applications more vulnerable to attack than those of US counterparts

Veracode report says many British firms are sitting targets for cyber criminals
22 Jul 2014

Snowden: hackers must make privacy tools for everybody

NSA whisteblower suggests ‘criminals’ unite to protect the world from government snooping
22 Jul 2014

Russian-state malware used by cyber criminals in banking Trojans

Gyges, developed by Russian intelligence, is used in banking Trojans and 'ransomware'
21 Jul 2014

LinkedIn users warned of new phishing scam

Fake emails discovered designed to harvest logins and passwords
18 Jul 2014

Small businesses convinced they won't be cyber attack targets have 'heads in the sand'

Britain's small businesses woefully under prepared to protect themselves against hackers, claims Kaspersky Labs
18 Jul 2014

Blackphone: BlackBerry 'compromised its integrity' in security years ago, and has no right to criticise us

Super-secure smartphone maker describes BlackBerry’s criticism as 'slinging mud'
17 Jul 2014

What will the government's new data retention bill mean for UK businesses?

James Walsh, head of telecoms, and Liz Fitzsimons, data protection specialist at Eversheds LLP discuss the new bill's implications
17 Jul 2014

Facebook number one social network for phishing attacks

Kaspersky Labs warns Facebook users remain vulnerable to cyber criminal phishing
16 Jul 2014

US critical infrastructure unprepared for cyber attack - report

Survey from Unisys and the Ponemon Institute indicates patchy preparedness of cyber attack
15 Jul 2014

Connecting risk management to cyber security

Danny Palmer investigates how businesses can protect themselves against uncertain cyber threats in light of the increasing number of connected devices in the world
14 Jul 2014

Assigning a value to corporate data

How are some of Britain’s top organisations trying to promote the value of their data to the biggest leakers – their own staff and clients? Peter Gothard reports
14 Jul 2014

Authorities and private firms collaborate to combat Shylock malware

Law enforcement agencies and web security firms work together to combat notorious malware
11 Jul 2014